A system and method for recommending products are disclosed. The method includes: receiving financial data associated with an account of a user; analyzing the financial data to determine a residual amount in the account of the user; recommending, using a recommendation engine, at least one product along with an associated confidence score to the user; receiving user feedback that relates to the recommended at least one product; generating a set of tasks associated with the recommended at least one product upon reception of a positive response from the user; and executing, using an action engine, the set of tasks associated with the recommended at least one product.
A method and a system for securely performing a password migration between authentication servers where the password is end-to-end encrypted and hashed are provided. The method includes: after the user has received first and second public keys from the first and second servers, and after the user has stored, in a memory, first and second encrypted versions of the password that are respectively encrypted by using the first and second public keys, transmitting a request to perform an authentication with the first server based on the first encrypted version of the password; after a validated token has been issued by the first server, receiving a request to update the password in the second server based on the token, and transmitting the request to the second server, together with the second encrypted version of the password and a request to migrate the user to the second server.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A method may include: receiving an identification of a current incident involving an affected element; generating a first Structured Query Language (SQL) query for recently-implemented change records for the affected element; executing the first SQL query on a database; receiving the recently-implemented change records for the affected element; generating a second SQL query for past incidents that are similar to the current incident; executing the second SQL query on the database; receiving the past incidents that are similar to the current incident, together with associated change records that were identified to be a cause of the past incidents; calculating a relevance score of each recently-implemented change record to the current incident, based on a similarity of the past change records that caused similar incidents; and returning the past change record for the affected element that is similar to the past change record for any element with a highest score.
Aspects of the subject disclosure may include, for example, obtaining a first state associated with a first microservice that performs a first step in a distributed process comprising a plurality of steps, wherein the first step is one of the plurality of steps; obtaining a second state associated with a second microservice that performs a second step in the distributed process, wherein the second microservice is distinct from the first microservice, and wherein the second step follows the first step; reconciling the first state with first known action data to determine whether a first action indicated by the first state is verified as completed, resulting in a first determination; and reconciling the second state with second known action data to determine whether a second action indicated by the second state is verified as completed, resulting in a second determination. Other embodiments are disclosed.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
5.
SYSTEM AND METHOD FOR DOWNSTREAM PLATFORM ACCESS ENABLEMENT TRIGGERED VIA AN ACTIVE METADATA CATALOG
Various methods and processes, apparatuses or systems, and media for enabling consistent access enforcement across downstream data platforms triggered via an active data catalog are disclosed. A processor implements an active data catalog; causes the active data catalog to receive metadata updates corresponding to a line of business including properties that may be used to control access enforcement across the downstream data platforms; executes a certification process to certify the metadata updates including the properties that may be used to control access enforcement; stores the certified metadata updates onto the active data catalog; updates the active data catalog with the certified metadata updates along with certification details data; and distributes the certified metadata to the downstream data platforms thereby enabling consistent access control enforcement.
A method for implementing a data server network infrastructure maintenance tool within a data server network. The method comprises obtaining an initial data server network configuration, extracting a set of correlations from at least one repository of historical network failure incident information, detecting a first set of failures via at least one telemetry system of the data server network, determining a current state of the data server network via the at least one telemetry system, generating an updated network configuration based on the first set of failures and the current state of the data server network, identifying a second set of components that is likely to fail, and at least one from among preventing and repairing at least one subsequent failure.
H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software for point of sale use for processing and management of payments and receipts, retail inventory management, and website design for brick and mortar and e-commerce merchants; downloadable software for patient and customer billing, payment processing and management, and appointment scheduling software for healthcare providers and other service providers; electronic mobile devices in the nature of multi-functional electronic payment terminals and point-of-sale terminals for reading credit and debit cards, conducting financial transactions, recording financial transactions, reporting financial transactions, and generating email or printed receipts; downloadable software for use as a digital wallet; downloadable software for storing and managing payment credentials and facilitating electronic payments Financial affairs and monetary affairs, namely, financial information, management and analysis services; banking services; banking services, namely, credit and debit card payment transaction processing services for merchants, restaurants, health care providers and other service providers; insurance brokerage services; real estate affairs, namely, real estate brokerage, real estate valuations, real estate investment services; financial transaction and payment services, namely, exchanging money, providing electronic processing of electronic funds transfer, ACH, credit card, debit card, electronic check and electronic payments, issuance of travelers' cheques, financial management; and financial research; digital wallet services; electronic wallet services; providing electronic processing of payments via digital wallets Software as a service (SAAS) services featuring software for point of sale use for processing and management of payments and receipts, retail inventory management, and website design for brick and mortar and e-commerce merchants; software as a service (SAAS) services featuring software for patient or customer billing, payment processing and management, and appointment scheduling for healthcare providers and other service providers; software as a service (SAAS) featuring software for use as a digital wallet
8.
SYSTEMS AND METHODS FOR ENHANCED APPLICATION INTERACTIONS
Systems and methods for enhanced application interactions are disclosed. In one embodiment, a method may include: receiving, by a common process, state information for a first application from the first application executed by an electronic device; storing, by the common process, the state information; receiving, by the common process and from a second application executed by the electronic device, a request for the state information; and providing, by the common process, the state information to the second application.
A method and a system for automatically generating audit records of data transfer events in order to validate data delivery and to facilitate monitoring and compliance with applicable regulations are provided. The method includes: receiving a notification that an event has commenced; obtaining information that relates to the event, including information that relates to a data transfer that occurs in connection with the event and information that relates to an intended destination and an intended timing of the data transfer; submitting, to a records repository, a request for records that relate to the event; receiving the records; comparing the information that relates to the event with the records; generating, based on a result of the comparison, an audit report that relates to the event; and transmitting the audit report to a predetermined destination.
In some aspects, the techniques described herein relate to a method comprising determining an event associated with a threshold probability of causing inaccessibility to an asset; retrieving, by a model executed by a processor and from a database, event data; determining, from a database of a plurality of assets, a set of assets affected by the event based on the event data; generating cause synthetic data related to the event for the set of assets to determine a category for the event based on a location of the event; generating effect synthetic data related to the event for the set of assets; generating a recovery strategy including a response detail based on the cause synthetic data and the effect synthetic data for each asset; generating a risk profile including the response detail for each asset and a probability of the event; and calculating a degree of risk.
Provided is a system that implements a mainframe continuous integration and continuous delivery (CI/CD) pipeline development, the system includes an application programming interface configured to receive data at a mainframe source code repository to enable software applications to communicate with each other via a communication network and a processor, coupled to a memory component and the API. The processor is configured to continuously monitor the mainframe source code repository for the received data to (i) detect a code commit and (ii) identify code components changed responsive to the code commit; synchronize the code commit with a distributed application source code repository; transfer the changed code components to the distributed application source code repository; and trigger, via a web hook, activation of the CI/CD pipeline in response to the transferred changed code components. The triggering occurs automatically when the changed code components are transferred to the distributed application source code repository.
A method and a system for performing real-time fraud detection by proactively identifying fraudulent activity before executing a transaction are provided. The method includes: receiving, from a user, first information that relates to a proposed transaction; providing the first information as an input to a machine learning model; using the machine learning model to generate an output that relates to potentially fraudulent activity associated with the first information; generating, based on the first output, an alert message that includes second information that relates to notifying the user about the potentially fraudulent activity; and transmitting the alert message to the user. The output may include a score that relates to a likelihood that the first information is associated with actual fraudulent activity, and the score may be normalized to fall in a range of between zero and ten.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
13.
SYSTEMS AND METHODS FOR SECURING LOGIN AUTHENTICATION
Systems and methods for securing login authentication are disclosed. In one embodiment, a method may include: (1) receiving, by a mobile application executed by a mobile electronic device, a login from a user; (2) determining, by the mobile application, that secure login authentication is required; (3) prompting, by the mobile application, the user for additional authentication information comprising a personal identification number or a passcode; (4) receiving, by the mobile application, the additional authentication information; (5) comparing, by the mobile application, the additional authentication information to stored authentication information; and (6) presenting, by the mobile application, a landing screen in response to the additional authentication information matching the stored authentication information.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A method may include: a unified account service receiving an account creation request and creating an account with an account number; the unified account service mapping the account number to a unique identifier; the unified account service streaming the unique identifier and account data to a unified ledger; the unified ledger creating a unified ledger account that does not identify the account number for the unique identifier and setting an account balance for the unified ledger account for booking periods; a unified postings service receiving a transaction with a transaction booking period for the account; the unified postings service identifying the unique identifier for the account using the mapping; the unified postings service routing the transaction and the unique identifier to the unified ledger, and the unified ledger to updating the account balance for the unified ledger account for the booking period specified by the transaction booking period.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
15.
SYSTEMS AND METHODS FOR DYNAMIC PROCESSING OF A HIGH-VOLUME OF TRANSACTIONS
A method may include a transaction processor: receiving a first transaction for an account; determining that there is not an active high-volume record lock on an account record for the account; acquiring a lock on the account record; receiving a second transaction for the account; attempting to acquire a lock on the account record; determining, in response to being unable to acquire a lock on the account record, that a lock acquire duration exceeds a lock acquire duration threshold; inserting an active high-volume record into a lock table; creating an interim balance record for the account that aggregates transactions received when the active high-volume record is active; receiving a third transaction for the account; determining that an idle duration between the third transaction and the second transaction does not exceed an idle duration threshold; and deleting the active high-volume record from the lock table and the interim balance records.
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
16.
SYSTEM AND METHOD FOR SKILL-BASED CONTRACT ASSIGNMENT
Various methods and processes, apparatuses or systems, and media for enabling skill-based contract assignment for completing a particular project are disclosed. A processor trains a model on a set of known criteria data, a plurality of dimensions data, and volume data; and receives a request, via a user interface, from a user to assign the contract for completing the project by selecting criteria determining data. The model applies a weight to the selected criteria determining data; generates a forced-rank list of subject matter experts (SMEs) with rankings and contact information; and transmits the forced-rank list to the user interface. The processor receives user input from the user, via the user interface, establishing an agreement to select an SME from the forced-rank list; transmits an electronic message to the selected SME to accept the agreement; and sets the agreement into a contract on a blockchain to ensure accuracy and encryption.
A method and a system for generating scripts that are usable for automatic construction of application programming interfaces (APIs) in an accurate, efficient, and streamlined manner are provided. The method includes: receiving, from a user, a set of requirements for an API; automatically generating, based on the requirements, a script that is usable for constructing the API, such as a Structured Query Language (SQL) script; retrieving, from a database based on the script, a set of data items that is usable for constructing the API; automatically constructing the API based on the script and the data items; and outputting the API to a terminal associated with the user.
A method and system of computer-automated detection of personally identifiable (PI) data in electronic data are provided. The method includes: receiving the electronic data including the PI data and transmitting the electronic data to a modifiable hash algorithm in a first computing environment. The method further includes generating, by the modifiable hash algorithm, hashed electronic data via masking the PI data; comparing, by a PI detector service function algorithm in a second computing environment, first electronic data fields of the received electronic data including the PI data with second electronic data fields of the hashed electronic data including the masked PI data in order to detect a match indicating a presence of unmasked PI data between the first and second electronic data fields; generating, by the PI detector service function algorithm, a result with a confidence level based on the comparison; and outputting the result with the confidence level.
Various methods and processes, apparatuses or systems, and media for computing a fair market value of a bond are disclosed. A processor generates a table where all weight vector associated with a pricing prediction value of the bond at a given time received from a plurality of data sources are included therein; receives weight vector as input corresponding to the bond from the table; and computes a loss function for each of the plurality of data sources individually, wherein each loss function includes a first part and a second part, the first term indicates a distance very closer to a real value of the price at which the trade was executed compared to the second part which is a term that penalizes predictions for being further away from the real value; and computes a fair market value of the bond based on the loss function.
Various methods and processes, apparatuses or systems, and media for transaction level pricing and balance management are disclosed. A processor receives a plurality of transactions associated with a card; enriches the plurality of transactions by consuming external transaction data associated with each transaction, populating preconfigured internal attributes data, and outputting enriched transactions; publishes the enriched transactions for executing a transaction level pricing and balance management algorithm; consumes the enriched transactions; identifies type of each transaction from the consumed enriched transactions by applying predefined rules; and executes, for each type of transaction, the transaction level pricing and balance management algorithm to perform the following operations at transaction level at the time of transaction posting instead of balance level calculations at cycle time: fee calculations, interest charge calculations, payment allocations, payment reversal processing, balance management at transaction level, service customers with intra cycle financial estimates, remove account processing at accumulated balance level.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
21.
METHOD AND SYSTEM TO MANAGE PERSONALLY IDENTIFIABLE INFORMATION IN A DOCUMENT
There are provided methods and systems for retrieval and management of target information in one or more files. For example, there is provided a system that includes a processor and memory including instructions which, when executed by the processor, can cause the processor to perform certain operations. The operations can include receiving a file and categorizing the file into one or more components. The operations can further include extracting a machine-readable arrangement from the one or more components and detecting target information from the machine-readable arrangement. Further, the operations can include modifying the target information and assembling an output file including the modified target information.
Systems and methods for enhanced conversational performance of large language models using adaptive retrieval-augmented generation are disclosed. A method may include: (1) receiving a query from a user; (2) retrieving a plurality of summaries of historical conversations from a database of historical conversation summaries similar to the query; (3) generating a first prompt comprising the query and the plurality of summaries; (4) submitting the first prompt to a first large language model (LLM); (5) receiving, from the first LLM, a first response; (6) presenting the first response to the user; (7) generating a second prompt for a summary of the query and the first response; (8) submitting the second prompt to a second LLM; and (9) saving a second response to the second prompt from the second LLM to the database of historical conversation summaries, wherein the second response comprises the summary.
Aspects of the subject disclosure may include, for example, capturing data by a first communication device associated with a data producer, signing the data with a signing key resulting in signed data, encrypting the signed data according to an encryption key resulting in encrypted signed data, and storing the encrypted data in a storage device. Further, the embodiments can include receiving, over a communication network, a request associated with the data from a second communication device associated with a data consumer, and providing, over the communication network, the encrypted signed data to the second communication device. The second communication device receives the encrypted signed data, decrypts the encrypted signed data according to a decryption key resulting in the decrypted signed data, and authenticates the decrypted signed data. Other embodiments are disclosed.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
A system and method for providing content-based assessments are disclosed. The method includes receiving a request from a user device to initiate a process for at least one property. Further, the method includes obtaining a plurality of media items captured from a construction site of the at least one property at predefined time intervals. Further, the method includes loading the media items into a trained model for performing an analysis, the analysis includes comparing the media items with a set of input data corresponding to a virtual representation of the property. Further, the method includes generating a first report and a second report related to a construction progress and a construction quality, and a third report based on the first report and the second report. Thereafter, the method includes transmitting a recommendation based on the third report, to a device to process the request.
Systems and methods for using display-enabled transaction cards are disclosed. A display-enabled transaction card may include: a substrate; a display on the substrate; an interface that may be configured to receive a card feature to display on the display; and a controller that may be configured to display the card feature on the display. A method may include: (1) receiving, by a controller of a display-enabled transaction card and via an interface on the display-enabled transaction card, a card feature, wherein the card feature may include card art, a reward status, or an account status; and (2) displaying, on a display of the display-enabled transaction card, the card feature.
Systems and methods for providing stateless management of a virtualization platform are disclosed. In some aspects, the techniques described herein relate to a method including: listening, at an agent executing on a host machine of a plurality of host machines that include a cluster for hosting virtual machines, for an event triggered on a virtual machine manager associated with the agent; determining, by the agent and based on the event, parameters needed for an API call at a central management service that manages a plurality of virtual machines and virtual machine managers; sending a Hypertext Transfer Protocol (HTTP) request to the central management service, wherein the parameters are included in the HTTP request; receiving, by the agent and from the central management service, a response to the HTTP request including return data based on the determined parameters and the API call.
In some embodiments, techniques described herein relate to a method including: receiving a user instruction at an application executed by an electronic device; generating, at a framework executed by a server, one or more feature groups based on the profile data; generating, at the framework, a data configuration file; generating, at the framework, a model configuration file; specifying, at the framework, a sequence of functionality steps for execution; generating, at the framework, a prediction score based on the sequence of functionality steps; saving and/or executing, at the framework, the sequence of functionality steps; and generating, at the electronic device, one or more outputs including, for example, a prediction based on the sequence of functionality steps.
In some aspects, the techniques described herein relate to a method including: receiving, by a collaboration service, location data of a user, wherein the location data includes a timestamp; verifying, by the collaboration service and based on a digital itinerary associated with the user, a location of the user; processing data from a data profile associated with the user as input data to a machine learning model; receiving, by the collaboration service and as output of the machine learning model, a plurality of predicted travel objective classifications; determining, by the collaboration service, a plurality of travel objectives, wherein each of the plurality of travel objectives is associated with one of the plurality of predicted travel objective classifications; determining, by the collaboration service, a travel objective within a predefined proximity of the location of the user; and displaying the travel objective to the user via a planning interface.
G01C 21/28 - NavigationNavigational instruments not provided for in groups specially adapted for navigation in a road network with correlation of data from several navigational instruments
G01C 21/36 - Input/output arrangements for on-board computers
29.
METHOD AND SYSTEM FOR IMPROVING CODE GENERATION QUALITY OF LARGE LANGUAGE MODEL THROUGH CODE GUARDRAILS
A method and a system for improving a quality of software code generated by using a large language model (LLM) via code guardrails are provided. The method includes: receiving a request for performing a task; providing the request as an input to the LLM; receiving, from the LLM, a first set of executable code that is intended to be usable for performing the task; automatically executing the first set of executable code in an environment that includes at least one guardrail component that is configured to detect errors; detecting at least one error, such as a hallucination error, based on a result of the execution; determining at least one feedback item based on the at least one error; and prompting the LLM to generate a second set of executable code based on the request, the first set of executable code, and the at least one feedback item.
A method for computing regional counterfactual rules to summarize recourse options is disclosed. The method includes receiving model data via an input, the model data including information that relates to a target model and a corresponding data set; training a surrogate model for the target model based on the model data; identifying, by using the surrogate model, rules for an output of the target model based on a predetermined threshold, the rules including a counterfactual rule; enumerating, by using the surrogate model, boundaries for the identified rules to partition an input space into a grid with cells, each of the cells including a hyperrectangular cell; labeling, by using the surrogate model, each of the cells with one of the identified rules based on predetermined optimality criteria; and merging, by using the surrogate model, each of the labeled cells based on a matching of the rules to generate regions of optimality.
An apparatus is provided including storage encoded computer executable code for a consolidated enterprise application configured to provide, to a select set of users with credentialed private access to the consolidated enterprise application, web-based access in a form of a given user experience. In select embodiments, the given user experience involves providing access to user interface static content. The consolidated enterprise application comprises plural frontend web-based independent user interface (UI) unit applications. More specifically, the UI unit applications are individual uncontainerized micro frontends. One or more content publishing interfaces may be provided, that are configured to publish content including the code to a web service storage. The one or more content publishing interfaces are configured to use application programming interface requests to publish the content to the web service storage.
H04L 67/51 - Discovery or management thereof, e.g. service location protocol [SLP] or web services
32.
SYSTEMS AND METHODS FOR GENERATING JOINTLY CERTIFIABLE RANDOMNESS AND PROVIDING JOINTLY CERTIFIABLE RANDOMNESS VIA PUBLICLY-CERTIFIABLE RANDOMNESS BEACONS
A method may include: selecting, by a plurality of classical parties, each of the classical parties using a classical party computer program, a distributed randomness protocol; generating, by the plurality of classical parties, a random string using the selected distributed randomness protocol; providing, by one of the classical parties, the random string to a quantum party, wherein the quantum party executes a quantum party computer program in communication with a quantum randomness source; executing, by the quantum party, a certified randomness protocol with the quantum randomness source using the random string as an input; receiving, by the quantum party, quantum randomness comprising a sequence of random bits from the quantum randomness source; and verifying, by the classical parties, that the random string was randomly selected, and that the quantum randomness is a valid output of the certified randomness protocol using the random string as input.
A method may include: generating, by a plurality of auditor computer programs and a data curator computer program, a first random string using a first distributed randomness protocol; sending the first random string to a quantum party computer program; executing, by the quantum party computer program, a certified randomness protocol with a quantum randomness source using the first random string; receiving, from the quantum randomness source, a first quantum randomness; generating, by the auditor computer programs and the data curator computer program, a second random string using a second distributed randomness protocol; extracting, by the data curator computer program and using a randomness extractor, a second quantum randomness from the first quantum randomness using the second random string, wherein the second quantum randomness comprises a near-uniformly random string; and executing, by the data curator computer program, a differential privacy protocol using the second quantum randomness as additive noise.
A method and a system for automatically migrating projects of a computing product in phases for a version upgrade are provided. The method includes: receiving at least one input relating to projects of the computing product; identifying, based on the at least one input, at least one project of the first version of the computing product to be migrated; deploying a first intermediate instance for the first version of the computing product; copying at least one first data file of the identified at least one project from a source instance to the first intermediate instance; importing the identified at least one project from the at least one first data file into the first intermediate instance; modifying the first intermediate instance to a second intermediate instance for the second version; copying at least one second data file; and importing the at least one identified project of the second version.
Payment cards with activated information displays are disclosed. In one embodiment, a payment card may include: a first layer; a second layer comprising an elastic material; an actuator; and an information layer between the first layer and the second layer, comprising: a plurality of information voids; and a microfluidic channel that communicates the plurality of information voids with the actuator. A fluid may be provided in the microfluidic channel such that when the actuator is depressed, fluid flows into the information voids making the information voids visible through the second layer, and when the actuator is released, the fluid flows out of the information voids making the information voids substantially invisible through the second layer.
A method may receive a text string of an utterance. A method may tokenize the utterance into a plurality of tokens. A method may transform the plurality of tokens into a plurality of feature vectors. A method may assign an entity label to each of the plurality of feature vectors. A method may resolve each feature vector of the plurality of feature vectors to a corresponding standardized value of a database query language.
Systems and methods for federated model validation and data verification are disclosed. A method may include: (1) receiving, by a local computer program executed by client system, a federated machine learning model from a federated model server; (2) testing, by the local computer program and using a policy service, the federated machine learning model for vulnerabilities to attacks; (3) accepting, by the local computer program, the federated machine learning model in response to the federated machine learning model passing the testing; (4) training, by the local computer program, the federated machine learning model using input data comprising local data and outputting training parameters; (5) identifying, by the local computer program using the policy service, accidental leakage and/or contamination by comparing the training parameters to the input data; and (6) providing, by the local computer program, the training parameters to the federated model server.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
A system and method for assessing a quality of a data fabric are disclosed. The method includes: receiving a plurality of input data products from at least one data source into the data fabric; and transmitting the plurality of input data products to a quality scoring engine for assessing the quality of the data fabric based on an analysis of each of the plurality of input data products. The analysis includes receiving a plurality of scoring parameters, rule definitions, and a metadata for each of the plurality of input data products; calculating a respective data offering quality score against each of the plurality of scoring parameters during the lifecycle of the plurality of input data products; generating a data fabric quality scoreboard based on an aggregation of the respective data offering quality scores calculated for each of the input data product; and displaying the data fabric quality scoreboard.
A method may include: receiving a plurality of log-text examples from network devices and labels indicating if the log-text example is anomalous or not anomalous; identifying, from the log-text examples and labels, rules for weak annotation, and validation labels for a validation dataset and test labels for a test dataset; organizing log-text examples in the validation dataset into a plurality of time windows; concatenating log-text examples in each time window; providing the concatenated log-text examples and the rules for weak annotation to a weak annotation framework, to a LLM training dataset; training a LLM with the LLM training dataset; collecting runtime log-texts from the network devices for a period of time; concatenating the runtime log-texts for the period of time; and prompting the LLM for analysis with the concatenated log-texts, wherein the LLM outputs a response of anomaly or no anomaly and a confidence in the response.
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
40.
SYSTEMS AND METHODS FOR MOBILE DEVICE PAYMENT USING TAP
Systems and methods for mobile device payment using tap are disclosed. In one embodiment, a method may include: reading, by a mobile application executed by a mobile electronic device, a machine-readable code comprising an embedded link to a provider website at a uniform resource locator (URL) provided by a provider of a good or service for a transaction involving the good or service; accessing, by the mobile application, the URL; receiving, by the mobile application and from the provider website, a payment by tap option; wirelessly receiving, by the mobile application, payment information from a physical financial instrument; providing, by the mobile application, the payment information to the provider website; and receiving, by the mobile application and from the provider website, confirmation of payment for the transaction.
A laser level target post for leveling a server cabinet. The laser level target post includes an elongated body section extending in a longitudinal direction, the elongated body section having an external surface that extends in the longitudinal direction, a reflective surface at a top end of the external surface of the elongated body section, wherein the top end reflective surface is operable to reflect a received light beam for leveling a top surface of the server cabinet, and a magnetic base at a bottom end of the elongated body section, wherein the magnetic base is operable to attach the laser level target post to a corner of the top surface of the server cabinet such that the longitudinal direction extends vertically.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
36 - Financial, insurance and real estate services
45 - Legal and security services; personal services for individuals.
Goods & Services
Charge cards, credit cards, chip cards, electronic data carrier cards, and payment cards; magnetic encoded cards and cards containing an integrated circuit chip in the nature of smart cards all containing programming used to process payments; cards encoded with security features for authentication purposes Promoting the use of credit cards through the administration of incentive benefits, privileges, consumer loyalty programs, and the offering of exclusive programs and promotions to cardmembers Issuance of credit cards; credit card services, namely, credit card verification, financial administration of credit card accounts, and processing of credit card annual fees, transactions, payments, and merchant refunds Personal concierge services for others comprising making requested personal arrangements and reservations and providing customer-specific information to meet individual needs rendered to cardmembers
43.
SYSTEMS AND METHODS FOR INTEGRATED DIGITAL WALLET PAYMENTS
Systems and methods for integrated digital wallet payments are disclosed. Embodiments may store and manage the lifecycle of assets in a digital wallet and may provide artificial intelligence and/or machine learning based recommendations to provide the optimal frictionless and rewarding consumer authentication and payment experience. Embodiments may leverage blockchain technology that provides a single consumer solution with decentralized wallet ownership and a data-driven network orchestration for optimal payments. Embodiments securely store the payment instruments and may provide personal usage recommendations for the optimal outcome based on, for example, consumer preferences.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A system and method are provided for image-based login and authentication. The system displaying a plurality of random images to a user; receiving from the user a selection of at least one target image from the plurality of random images; generating a hash number for the at least one target image; generating an encrypted identification token; and associating the encrypted identification token with the user. The hash number identifies the at least one target image. The encrypted identification token includes the hash number.
G06F 21/36 - User authentication by graphic or iconic representation
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
45.
SYSTEMS AND METHODS FOR DETECTION OF HALLUCINATION IN LARGE LANGUAGE MODELS
Systems and methods for detection of hallucination in large language models are disclosed. According to an embodiment, a method may include: (1) receiving, by a computer program, a plurality of input texts, wherein each input text is a prompt for a large language model (LLM) and may include a slight perturbation from an initial input text; (2) generating, by the computer program and for each of the plurality of input texts, an input embedding vector; (3) providing, by the computer program, each input text to a large language model (LLM); (4) receiving, by the computer program and for each input text from the LLM, an output text; (5) generating, by the computer program and for each of the plurality of output texts, an output embedding vector; and (6) generating, by the computer program, a hallucination metric based on the input embedding vectors and the output embedding vectors.
Various methods and processes, apparatuses or systems, and media for deterministically deriving underlying graph structure and associated text information in a document are disclosed. A processor implements a vision-based algorithm and a network-based algorithm that may extract and structure a diagram from an image obtained from the document. The processor deterministically derives underlying graph structure and associated text information in the document by applying the vision-based algorithm and the network-based algorithm, thereby allowing encoding of graph content and reasoning into downstream applications including LLM inputs, graphical question-answering, and information extraction tasks. The processor also implements OCR algorithm for text fields, and then isolates which piece of text belongs to which node by examining the spatial coordinates of the text against bounding box of the node and executes cross-page resolution.
G06V 10/46 - Descriptors for shape, contour or point-related descriptors, e.g. scale invariant feature transform [SIFT] or bags of words [BoW]Salient regional features
G06V 20/70 - Labelling scene content, e.g. deriving syntactic or semantic representations
47.
METHOD AND SYSTEM FOR DETECTION AND MITIGATION OF ARTIFICIAL INTELLIGENCE HALLUCINATIONS
Methods and systems for detecting and mitigating hallucinations in artificial intelligence (AI) summarizations of user-generated content are provided. The method includes: receiving an AI-generated content item; retrieving historical content items that have been generated by human beings; comparing the AI-generated content item with the historical content items in order to determine whether text string matches are present; when a determination is made that no match exists, performing a semantic matching operation to identify text strings included in the historical content items that are semantically similar to text strings in the AI-generated content item; and determining, based on the comparison and the semantic matching operation, whether the AI-generated content item is a hallucination. When a hallucination is detected, the hallucination may be mitigated by removing a textual perturbation and/or replacing the textual perturbation with text that accurately reflects the original content item.
Systems and methods for generating synthetic training data are disclosed. A method may include: (1) receiving user speech from a user; (2) generating an input file comprising text of the user speech; (3) extracting entities from the text in the input file; (4) creating an input data structure for a data structure for the entities, wherein the input data structure comprises a plurality of columns, a column name for each column, a data attribute for each column, and a data type for each column, and a number of records based on a volume parameter; (5) converting the data type for each column to an ANSI SQL-standard data type; (6) generating a database agnostic data structure having the column names and the ANSI SQL-standard data type; (7) generating synthetic data for the database agnostic data structure; and (8) outputting an output file comprising the synthetic data.
Systems and methods for verification by tap are disclosed. In one embodiment, a method may include: receiving, by a computer program executed by an electronic device and from a mobile application executed by a mobile electronic device, an action selected by a user; determining, by the computer program, that the action is a sensitive action; causing, by the computer program, the mobile application to display an instruction to present a wireless-enabled device to the mobile electronic device; receiving, by the computer program and from the mobile application, device information that was received wirelessly from the wireless-enabled device; validating, by the computer program, the device information; and executing, by the computer program, the sensitive action in response to the device information being validated.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
50.
SYSTEMS AND METHODS FOR IN-PERSON INTERACTIVE SHOPPING
Systems and methods for in-person interactive shopping are disclosed. In one embodiment, a method may include: (1) identifying, by a computer program, a customer that is present in an area; (2) monitoring, by the computer program, a location of the customer in the area; (3) receiving, by the computer program and from a sensor near the location of the customer, a customer movement associated with removing an item from a shelf; (4) identifying, by the computer program, the item; (5) predicting, by the computer program, that the customer has removed the item from the shelf; (6) adding, by the computer program, the item to a virtual shopping cart for the customer; (7) decreasing, by the computer program, a stored inventory of the item; and (8) charging, by the computer program, the customer for the item.
Systems and methods for configuration driven integration of services in business process models agnostic of a workflow system are disclosed. An exemplary method includes receiving, at a service executor, a generic service call from a business process management notation (BPMN), wherein the generic service call includes a service name parameter, wherein the service name parameter is associated with a service task of the BPMN, and wherein the service name parameter is associated with a service. The service executor can construct a call to the service including required data from a transient data store. The service executor can then receive return data from the service, store the data in the transient data store and respond to the BPMN that the service task has been completed.
Systems and methods for protecting vulnerable persons from fraudulent activity are disclosed. A method may include: (1) receiving, by a computer program executed by an electronic device, a transaction involving a person having a registered guardian; (2) determining, by the computer program, that the transaction requires guardian consent from the registered guardian; (3) communicating, by the computer program, a notification comprising a code to a registered guardian electronic device associated with the registered guardian; (4) receiving, by the computer program and from the person, the code; and (5) executing, by the computer program, the transaction in response to receiving the code.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
53.
SYSTEM AND METHOD FOR GENERATING COMPETING MODELS IN RASHOMON SETS FOR GRADIENT BOOSTING
A method may include: receiving a dataset comprising a plurality of samples and a loss function; training a first number first machine learning models using the dataset comprising, wherein each of the first machine learning models has a similar performance; selecting one of the first machine learning models with a smallest loss; computing a residual for each of the plurality of samples using the one first machine learning model; defining a new dataset comprising the plurality of samples and the residual for each samples; training the first machine learning model with the new dataset; generating a second plurality of machine learning models by repeating the selecting, the computing, the defining, and training for a number of boosting iterations; selecting a subset of the second plurality of machine learning model models having a specified property; and deploying the subset of second machine learning models to a downstream task.
Systems and methods for conducting composable quantum oblivious transfer over noisy quantum channels are disclosed. Embodiments provide a method for constructing a quantum oblivious transfer (QOT) protocol using noisy quantum channels and devices through the use of a quantum-hard one-way function. This construction allows the construction of QOT protocols that achieve simulator security, allowing them to be used in a black-box fashion as part of other cryptographic constructions, including arbitrary secure multiparty computations.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
55.
SYSTEMS AND METHODS FOR DECENTRALIZED RECOVERY OF IDENTITY ATTRIBUTES
Systems and methods for decentralized recovery of identity attributes are disclosed. In one embodiment, a method for decentralized storage of identity data may include: (1) receiving, at an identity management computer program executed by a computer processor, identity data from a user electronic device; (2) parsing, by the identity management computer program, the identity data into a plurality of portions; (3) mapping, by the identity management computer program, each portion to one of a plurality of storage locations; and (4) storing, by the identity management computer program, the plurality of portions to the plurality of storage locations based on the mapping.
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Providing temporary use of online, non-downloadable software for facilitating the issuance, management, transfer, and settlement of deposit tokens and other digital or virtual blockchain-based payment instruments representing funds held with a financial institution; Software as a service (SaaS) featuring technology for enabling payments, settlements, and programmable transactions using deposit tokens and other digital assets on public and private blockchains; Providing online non-downloadable software for integrating deposit tokens with traditional bank accounts and financial systems; Providing online non-downloadable software for account-to-account transfers of deposit tokens representing funds held with a financial institution; Software as a service (SAAS) services featuring software for transferring, managing and processing deposit tokens, digital currency, virtual currency, and cryptocurrency based on blockchain technology; Platform as a service (PAAS) featuring computer software platforms for transferring, managing and processing deposit tokens, digital currency, virtual currency, and cryptocurrency based on blockchain technology; Software as a service (SAAS) services featuring software for recording and exchanging financial and non-financial data and information via a cryptographic ledger; Providing temporary use of non-downloadable software for facilitating peer-to-peer and institutional payments, cash management, and liquidity optimization using digital or virtual blockchain-based payment solutions; Providing temporary use of online non-downloadable software for accessing, reading, and tracking information in the field of financial transactions on a blockchain; Providing temporary use of online non-downloadable software for financial transactions on a blockchain; Providing temporary use of online non-downloadable software for processing electronic payments; Providing online non-downloadable software for data storage and certification using blockchain technology; Providing online non-downloadable software for managing smart contracts using blockchain technology; Electronic storage of deposit tokens and other digital or virtual blockchain-based payment instruments for others; Electronic storage of data related to financial transactions using blockchain technology for others; Providing online non-downloadable software for enabling secure access to, and transactions from, digital wallets associated with blockchain-based payment solutions; Providing online non-downloadable computer software for use as a digital wallet or electronic wallet; Design and development of computer software relating to deposit tokens, digital currency, virtual currency; Providing authentication, security, and trust services for blockchain-based payment solutions; Data encryption services, namely, electronic monitoring of personally identifying information to detect identity theft via the internet
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing temporary use of online, non-downloadable software for facilitating the issuance, management, transfer, and settlement of deposit tokens and other digital or virtual blockchain-based payment instruments representing funds held with a financial institution; Software as a service (SaaS) featuring technology for enabling payments, settlements, and programmable transactions using deposit tokens and other digital assets on public and private blockchains; Providing online non-downloadable software for integrating deposit tokens with traditional bank accounts and financial systems; Providing online non-downloadable software for account-to-account transfers of deposit tokens representing funds held with a financial institution; Software as a service (SAAS) services featuring software for transferring, managing and processing deposit tokens, digital currency, virtual currency, and cryptocurrency based on blockchain technology; Platform as a service (PAAS) featuring computer software platforms for transferring, managing and processing deposit tokens, digital currency, virtual currency, and cryptocurrency based on blockchain technology; Software as a service (SAAS) services featuring software for recording and exchanging financial and non-financial data and information via a cryptographic ledger; Providing temporary use of non-downloadable software for facilitating peer-to-peer and institutional payments, cash management, and liquidity optimization using digital or virtual blockchain-based payment solutions; Providing temporary use of online non-downloadable software for accessing, reading, and tracking information in the field of financial transactions on a blockchain; Providing temporary use of online non-downloadable software for financial transactions on a blockchain; Providing temporary use of online non-downloadable software for processing electronic payments; Providing online non-downloadable software for data storage and certification using blockchain technology; Providing online non-downloadable software for managing smart contracts using blockchain technology; Electronic storage of deposit tokens and other digital or virtual blockchain-based payment instruments for others; Electronic storage of data related to financial transactions using blockchain technology for others; Providing online non-downloadable software for enabling secure access to, and transactions from, digital wallets associated with blockchain-based payment solutions; Providing online non-downloadable computer software for use as a digital wallet or electronic wallet; Design and development of computer software relating to deposit tokens, digital currency, virtual currency; Providing authentication, security, and trust services for blockchain-based payment solutions; Data encryption services, namely, electronic monitoring of personally identifying information to detect identity theft via the internet.
58.
METHOD AND SYSTEM FOR IDENTITY BROKERAGE FOR CLOUD ACCESS
There are provided methods and systems for cloud access control. For example, a method is provided as instructions on a non-transitory computer-readable medium. The instructions may be configured to cause a processor to perform certain operations. The operations can include receiving information about a connecting entity, and the connecting entity seeking to establish a connection to a cloud environment. The operations can further include determining, based on a policy, one or more attributes associated with the connecting entity. The operations may also include partitioning the cloud environment, according to one or more attributes.
Aspects of the subject disclosure may include, for example, receiving, from a transaction terminal, a request for reference IDs, based on the receiving, providing, to the transaction terminal, a proof-of-work problem for the transaction terminal to solve, after the providing, receiving, from the transaction terminal, a solution to the proof-of-work problem, performing one or more actions to verify the solution, based on successful verification of the solution, transmitting a range of reference IDs to the transaction terminal, thereby enabling the transaction terminal to utilize the range of reference IDs in relation to transaction processing. Other embodiments are disclosed.
Methods and systems for computing input attributions to accurately explain predictions of decoder-only sequence classification models are provided. The method includes: receiving a set of inputs to the decoder-only sequence classification model; generating, based on the first set of inputs, a perturbed version of the set of inputs; sampling a binary mask from a predetermined masking distribution; generating a group of masked versions of the perturbed set of inputs by applying the binary mask to the perturbed set of inputs; generating, based on the group of masked versions of the perturbed set of inputs, corresponding sets of intermediate predictions that correspond to the decoder-only sequence classification model; computing, based on the sets of intermediate predictions, a set of input attributions; and determining, based on the set of input attributions, an explanation that relates to a prediction of the decoder-only sequence classification model.
Various methods and processes, apparatuses or systems, and media for evaluating LLMs on time series feature understanding are disclosed. A processor implements a pre-trained LLM; generates a comprehensive taxonomy for evaluating analytical capabilities of the LLM in a context of time series data, the comprehensive taxonomy including a feature and a corresponding sub-category of the feature. In evaluating analytical capabilities of the LLM in the context of time series data, the processor determines whether the LLM can detect the feature; and when it is determined that the LLM can detect the feature, determines whether the LLM can identify the sub-category of the feature; automatically generates a feature detection and classification score for the LLM indicating performance time series information retrieval and arithmetic reasoning performance measured by accuracy for different time series; and displays the score onto a graphical user interface.
Systems and methods for providing governance as finite state machines are disclosed. A method may include: a computer program in a compute environment: (1) receiving state machine definitions for a plurality of state machines; (2) saving the state machine definitions in a graph database; (3) receiving an event from one of a plurality of governed systems or a peer computer program in a peer compute environment, an event; (4) querying the graph database for one of the state machine definitions for the event; (5) instantiating a state machine instance using the state machine definitions; (6) executing a transition based on a current state; (7) receiving an instruction from the state machine; and (8) sending the instruction to one or more of the governed systems; wherein the one or more governed systems implement the instruction.
A method and a system for using a large language model (LLM) to automatically translate textual instructions into executable software code via skill distillation and composition are provided. The method includes: receiving a request for performing a task and a prompt; providing, as an input to an LLM, the first request and a response to the prompt; receiving, from the LLM, a set of code that implements a function that corresponds to a skill that is usable for performing the task; generating a test that relates to the task; performing the test by executing the set of code and checking whether the task has been successfully completed; and when the task has been successfully completed, storing the set of code in a skills library. Sets of code stored in the skills library may then be accessed and combined in order to perform larger tasks.
Various methods and processes, apparatuses or systems, and media for data processing are disclosed. A processor implements an AI powered bot system; receives, via a user interface within the bot, user input as text data wherein the text data indicates a RFQ for a derivative instrument; transmits the text data to an AIML NLP service; extracts, by a parsing module, parameters associated with the RFQ by utilizing an entity extraction model provided by the AIML NLP service; normalizes the extracted parameters and transmits the normalized parameters to an automated pricing module; receives pricing details data by a response generation component embedded within the parsing module from the automated pricing module; and transmits the pricing details data to the bot for receiving user input via the user interface to conduct a transaction with respect to the derivative instrument.
A system and method for providing an automated ticket resolution are disclosed. The method includes registering at least one queue owner upon successful completion of an onboarding of the at least one queue owner. The method includes receiving a ticket data from the at least one queue owner, the ticket data comprises data associated with a plurality of tickets and corresponding resolution of the plurality of tickets. The method further includes loading the ticket data into a data repository to train a model for the automated ticket resolution. The method includes receiving at least one ticket via a ticket management platform. The method further includes identifying a resolution for the at least one ticket using the model trained from the ticket data. The method includes executing the identified resolution to resolve the at least one ticket.
In some aspects, the techniques described herein relate to a method including: receiving, at a change request service, a request to update contact information data; receiving, at the change request service, from a verification service provider, a raw ownership score; normalizing, by the change request service, the raw ownership score; sending, by the change request service, the contact information data, the customer identifier, and the normalized ownership score to a risk engine; receiving, by the change request service from the risk engine, a confidence score; providing, by the change request service, the confidence score, the normalized ownership score, and historical data associated with the stored customer profile, to a consolidation function; receiving, by the change request service and from the consolidation function, a consolidated trust score; and updating a datastore record associated with a customer represented by the customer identifier with the contact information data.
A method may include: (1) receiving, at a computer program, such as a mobile banking application, executed by an electronic device, a request to disable a feature of the computer program, such as a payment feature, for a time period; (2) disabling, by the computer program, the feature; (3) determining, by the computer program, that the time period has passed; and (4) enabling, by the computer program, the feature. The feature may be disabled by removing an icon to access the feature, and may be enabled by adding the icon to access the feature. The method may also include: monitoring, by the computer program, a location of the electronic device; determining, by the computer program, that the electronic device is in a registered location; and enabling, by the computer program, the feature even if the time period has not passed.
H04M 1/72463 - User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
H04M 1/72403 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
H04M 1/72457 - User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
H04M 1/72469 - User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
A method may include: an access management service receiving a client credential from a client; the access management service generating a bearer token for the client electronic device and communicating the bearer token to the client electronic device; a blockchain integration service receiving a remote procedure call with the bearer token from the client electronic device; the blockchain integration service validating the bearer token with the access management service; the blockchain integration service receiving, from the access management service, a client profile comprising the client credential; the blockchain integration service determining that the remote procedure call is a contract create call; the blockchain integration service submitting the contract create call to a blockchain network; and the blockchain integration service adding the client and/or the contract to an allow list, wherein the allow list identifies clients that are allowed to access the contract on the blockchain network.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
Various methods, apparatuses, systems, and media for implementing endpoint detection and response and data protection correlation are disclosed. A correlation engine receives a data stream from multiple sources and one or more patterns. A processor analyzes the data to relate an event to the one or more patterns and executes a policy when the event matches the one or more patterns to identify suspected encrypted data files. The processor transfers the suspected encrypted data files and an encryption key to a controlled testing environment to use the encryption key to safely decrypt the suspected encrypted data files and to test the suspected encrypted data files to determine a potential network impact of executing each of the suspected encrypted files on the network. The processor detonates, from the controlled testing environment, the suspected data files confirmed during the testing to have a negative impact on the network.
A method for providing a tool for individualized financial planning and navigation that is tailored to user preferences and offers flexibility with respect to modifications in financial goals is provided. The method includes: receiving information that includes a financial goal of a user; applying an optimization algorithm that is designed to analyze the information with respect to the financial goal; and using a result thereof to determine an achievable percentage of the financial goal of the user and recommendation(s) for modifying the information in order to increase the achievable percentage of the financial goal. The information further includes a number of time steps for achieving the goal, a first amount of money that the user contributes per time step towards the goal, and a second amount of money that the user expects to save by the end of the time steps.
Various methods and processes, apparatuses or systems, and media for automating development, testing, and productionizing a pipeline for users are disclosed. A processor receives a request from a user to access an application, the request including user's credentials data; grants access to the application based on verifying the user's credentials data with prestored credentials data received by calling an authentication server; identifies the user's role within a computing environment; automatically presents a template that corresponds to the user's role allowing the user to write code to source data either by bringing the user's own data into the computing environment or by connecting to data that resides in a database; automatically integrates the written code with a continuous integration continuous delivery pipeline for production of a model; and deploys the model after training and testing the model while managing and maintaining all necessary guardrails from a control standpoint within the computing environment.
A method may include: an access control computer program receiving a third-party registration comprising a biometric from a third party; the access control computer program receiving an asset owner registration comprising an identification of a physical asset, an identification of a physical asset access control device that controls access to the physical asset, and an identification of the third party to access the physical asset; the access control computer program receiving, from the physical asset access control device, a biometric from the third party; the access control computer program comparing the biometric received from the physical asset access control device to the biometric in the third-party registration; and the access control computer program instructing the physical asset access control device to grant access to the physical asset in response to the biometric received from the physical asset access control device matching the biometric in the third-party registration.
A method and a system for using a skipping mechanism to automatically detect out-of-distribution (OOD) inputs to neural networks in an efficient and accurate manner are provided. The method includes: receiving a proposed input to a neural network at a first gate of the neural network; estimating, based on an output generated by the first gate, a first probability that the proposed input is classifiable as being OOD; forwarding the first proposed input to at least one additional gate of the neural network, including skipping at least one layer of the neural network; estimating, based on a respective output generated by each respective additional gate, a corresponding probability that the proposed input is classifiable as being OOD; and determining, based on the estimated probabilities, whether the proposed input is classifiable as being OOD by determining whether at least a minimum number of the estimated probabilities exceed a predetermined threshold.
Aspects of the subject disclosure may include, for example, receiving information regarding a plurality of jobs, assigning the plurality of jobs to a plurality of workers in accordance with a base schedule, wherein the base schedule is derived by solving an initial scheduling model that is configured to facilitate job assignments based on worker availability, capabilities, skills, experience, or a combination thereof, while reducing or minimizing job completion time and maintaining a determined balanced load, detecting one or more disruptions or events after the assigning, and causing the base schedule to be repaired based on the detecting, wherein the causing involves solving a scheduling repairing model that is configured to repair an existing schedule based on detected disruptions or events, while reducing or minimizing an impact of the detected disruptions or events on the existing schedule. Other embodiments are disclosed.
Systems and methods for automatically optimizing computer infrastructure by implementing multiple lines of defense in software development lifecycles. A method may include: (1) receiving information for on-premises infrastructure and costs associated with the on-premises infrastructure; (2) mapping the on-premises infrastructure to a proposed cloud infrastructure; (3) generating, using an artificial intelligence engine, an architecture diagram of the cloud infrastructure; (4) validating the proposed cloud infrastructure against organizational standards; (5) generating infrastructure as code for the proposed cloud infrastructure; (6) performing a code scan on the infrastructure as code; (7) identifying deviations from the infrastructure as code from the code scan; (8) generating a pull request for code from a source code repository based on the deviations; (9) identifying services and components to be deployed in the infrastructure as code; and (10) deploying the services and components to a cloud environment.
A method and system for using AI techniques to monitor the performance of an AI model and automatically perform an appropriate corrective action when necessary are provided. The method includes: receiving first data that relates to an AI model; generating, based on the received first data, at least one key performance indicator (KPI) that relates to the AI model; comparing each of the at least one KPI to at least one configurable threshold; assigning, based on a result of the comparing, a model health rating; and when the model health rating is less than a predetermined minimum acceptable health rating, performing, by the at least one processor, at least one corrective action that causes an increase in the model health rating.
Systems and methods for network-based delivery of dynamic content are disclosed. A method may include: receiving, by a network computer program, a location for a customer electronic device associated with a customer; determining, by the network computer program and from the location, that the customer is within a predetermined distance of a merchant; requesting, by the network computer program, content for one or more payment card issued by an issuer to the customer from an issuer backend for the issuer; receiving, by the network computer program, the content; and communicating, by the network computer program, the content to a merchant backend for the merchant. The merchant backend receives, from a merchant point of sale device, payment card information for one of the payment cards, retrieves the content for the payment card, and causes the merchant point of sale device to display the content on a display.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
78.
METHODS, SYSTEMS, AND DEVICES FOR SCALABLE MACHINE LEARNING MODEL INFRASTRUCTURE
Aspects of the subject disclosure may include, for example, obtaining a processing capacity associated with a machine learning model and obtaining a memory capacity associated with the machine learning model, and obtaining a processing capacity threshold and obtaining a memory capacity threshold. Further embodiments include provisioning a head node and a first group of worker nodes based on the processing capacity, the memory capacity, the processing capacity threshold, and the memory capacity threshold, provisioning a first portion of data engineering pipeline on each of the first group of worker nodes, and provisioning a first portion of the machine learning model on each of the first group of worker nodes. Other embodiments are disclosed.
A system for implementing a transmission log bucketing tool that provides an optimized transmission log storage and retrieval scheme. The system may comprise a processor and memory storing instructions that cause the processor to perform operations. The operations may comprise generating a manifest that comprises a transmission log table, obtaining a first set of transmission logs, evaluating the first set of transmission logs against the manifest to determine a first set of respectively corresponding shard keys, and utilizing the first set of respectively corresponding shard keys to at least one from among store the first set of transmission logs and retrieve the first set of transmission logs.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
80.
ARTIFICIAL INTELLIGENCE POWERED HOLISTIC DIGITAL BANKING
Provided is a method for implementation of an application running on a computer having a processor and a memory or a cloud infrastructure, receiving a request from a user, via a gateway manager, to initiate a future payment transaction in accordance with a selected one of a plurality of payment transaction types. The method also includes comparing, via an allocation engine, the requested future payment transaction with patterns derived from an analysis of stored previous payment transactions associated with the user, wherein the patterns represent an association of each of the payment transaction types with one of a plurality of different types of vendors from the stored previous payment transactions. A payment transaction type is automatically selected for the future payment transactions based on the comparison.
A method for performing a determination of voter eligibility and facilitation of secure electronic voting is provided. The method includes authenticating a voter according to security setting and displaying a voting page for a jurisdiction corresponding to the voter's residence. The method then transmits to an adjudicating entity, voter information for determination of voter eligibility, and stores the voter information in a non-public blockchain. The method further includes determining whether the voter is eligible to vote based on the voter information stored in the non-public blockchain, generating a unique voter specific ballot for the voter in response to a determination that the voter is eligible to vote, and transmitting, to the adjudicating entity, a ballot selection received from the voter. The ballot selection is then stored on a public blockchain, and made available for release.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
82.
Method and system for verification with large language models for data querying
A method and system for verifying a structured query language (SQL) query are provided. The method includes: receiving a first request to retrieve first data that is accessible via a database; identifying an intention of the first request; generating, based on the first request, a first SQL query to retrieve the first data from the database; predicting, based on the generated first SQL query, an output of the generated first SQL query; determining whether the predicted output matches the identified intention of the first request; generating, based on the determining of whether the predicted output matches the identified intention of the first request, a second SQL query to retrieve the first data that is accessible via the database, when the predicted output of the first SQL query does not match the identified intention of the first request.
A method and system for generating a dynamic graph network for a plurality of documents in a corpus are disclosed. The method includes analyzing a first document among the plurality of documents included in the corpus; generating a first node for the first document in the dynamic graph network; extracting one or more values included in the first document; assigning a key for each of the one or more values included in the first document; identifying at least one entity for the one or more values extracted from the first document; generating a second node for the at least one entity in the dynamic graph network; setting a status identifier for each of the first node and the second node generated; generating a first edge for the first node and the second node; and establishing a connection between the first node and the second node via the first edge.
A method may include: (1) generating, by a classical computer program executed by a client electronic device, a pseudorandom graph having a depth, a number of nodes based on a number of qubits in a quantum computer, and edges between the nodes; (2) creating, by the classical computer program, a coloring of the graph such that no two edges that share a node have the same color; (3) creating, by the classical computer program, a graph coloring layer for each color that includes edges with that color; (4) generating, by the classical computer, a quantum circuit from the graph coloring layers; (5) estimating, by the classical computer program, a cost of validating the quantum circuit; (6) determining, by the classical computer program, that the cost is acceptable; and (7) saving, by the classical computer program, the quantum circuit in response to the cost being acceptable.
A method may include: (1) querying, by a randomness computer program executed by a randomness electronic device, a quantum randomness source for a plurality of sequences of random bits; (2) receiving, by the randomness computer program, the plurality of sequences of random bits; (3) saving, by the randomness computer program, the plurality of sequences of random bits in a randomness pool; (4) receiving, by the randomness computer program, a request for randomness from a client randomness computer program executed by a client electronic device; (5) drawing, by the randomness computer program, a subset of the plurality of sequences of random bits from the randomness pool; (6) marking, by the randomness computer program, the subset of the plurality of sequences of random bits as used; and (7) communicating, by the randomness computer program, the subset of the plurality of sequences of random bits to the client randomness computer program.
A system for implementing a resource transmission management tool that processes resource transmissions, the system comprising a processor that is configured to: obtain a first set of requests that comprises a first resource transmission request; transform the first resource transmission request into a first corresponding encoded resource request; generate, by organizing an arrangement of at least the first corresponding encoded resource request, a pre-processed set of requests that comprises the first corresponding encoded resource request; assign, based on a topology of the pre-processed set of requests, a respectively corresponding weight to each transmission request field; analyze the first corresponding encoded resource request according to associated instructions; and generate a response to the associated instructions based on the analysis.
H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
87.
SYSTEM AND METHOD FOR IMPLEMENTING A MODEL THAT PREDICTS THE PROBABILITY OF HALLUCINATION FOR ANY QUERY IMPOSED TO AN LLM
Various methods and processes, apparatuses or systems, and media for predicting probability of hallucination before generation for a query imposed to a Large Language Model (LLM) are disclosed. A processor causes a trained generative model to receive a query from a user via a user interface operatively connected to the generative model; perturbs the received query n times into unique variations that retain the original semantic meaning of the received query yet significantly diverge lexically; implements n+1 independent agents to sample an output from each query including the original received query; applies the simulation algorithm on the sampled outputs; derives an empirical estimate into an expected rate of hallucination for the original received query as a ground truth for the encoder; and outputs a probability of hallucination value for the query received by the generative model before the LLM generates an output.
G06F 30/27 - Design optimisation, verification or simulation using machine learning, e.g. artificial intelligence, neural networks, support vector machines [SVM] or training a model
88.
METHOD AND SYSTEM FOR SECURING LARGE LANGUAGE MODEL SERVICES AGAINST PRIVACY ATTACKS
A system for securing a large language model (LLM) service against LLM privacy attacks. The system may comprise a processor that executes instructions that cause the processor to: interface with each output of the LLM service and each client network of the LLM service; monitor each output of the LLM to detect at least one client query textual response; detect and redact the at least one client query textual response according to an evaluation of that response and at least one current client privilege level that is assigned to at least one target client network account to which the at least one client query textual response is directed; and transmit a result of the redacting to a client device of the at least one target client network account.
A method and system for providing end-to-end observability for distributed event-driven applications are disclosed. The method includes generating a trace for an executed transaction and decomposing the generated trace into multiple synthetic traces or sub-traces. Each of the synthetic traces or sub-traces represents an operation performed for a discrete application function contained within that transaction. For each sub-trace a synthetic root span is generated, the root span representing an end-to-end time to process the respective application function.
G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Various methods and processes, apparatuses or systems, and media for generating a grounded answer to a query using a corresponding table are disclosed. The present disclosure provides decomposing a complex query into natural-language sub-queries or steps, which are then translated into database manipulation commands to sequentially transform input table into intermediate or simplified tables, until the input table is simplified for performing a final decision query. Each of the sub-queries may be associated with corresponding intermediate or simplified tables to ground the sub-queries.
There is provided a method residing as instructions on a non-transitory computer-readable medium, the instructions being configured to cause a processor to perform operations comprising receiving a request, the request being associated with a batch process for manipulating a dataset. The method also includes receiving a deadline by which the request must be executed, evaluating a set of requirements for executing the request by the deadline, entering the request into a queue, the queue being associated with a hardware location physically hosting the dataset, and determining an optimum time within the deadline for executing the request.
A foam-water fire sprinkler includes a nozzle, a shroud body, an agitator, and a deflector. The nozzle defines a nozzle passage that receives a foam-water solution therein. The shroud body defines a shroud passage that receives the foam-water solution from the nozzle passage. The agitator is positioned within the shroud passage, and has a rounded agitator portion and a straight agitator portion that extends from the rounded agitator portion. The foam-water solution impinges on the agitator at the rounded agitator portion to aspirate the foam-water solution with air to generate foam. A portion of the foam-water solution separates from the agitator at the straight agitator portion. The deflector deflects the foam-water solution and the foam to generate a spray pattern of the foam-water solution and the foam at a coverage area.
A system and method for detecting driver of variance are disclosed. The method includes receiving dependent variable(s) (y) and a set of independent variables (Xn). Next, the method includes computing a correlation (Rxx) between at least two of the independent variables and then calculating a partial effect (β) of each of the independent variables on the dependent variable(s) (y). The method includes estimating a row relative weight as a percentage of coefficient of determination R2 based on a sum of squared values of the calculated partial effect of the independent variables. The method includes determining a distance from median of x-coordinate (DFM x) and y-coordinate (DFM y) of the set of independent variables. The method includes detecting and displaying at least one driver of variance calculated via a weighted Euclidean distance calculated based on the DFM x and DFM y, and the estimated row relative weight.
Systems and methods for immersive data management in spatial computing are disclosed. A method may include: (1) requesting from an identity and access management service executed in a cloud environment, an access token; (2) receiving, from an identity and access management service, the access token comprising user entitlements to access a plurality of elements in a plurality of scenes; (3) requesting one of the plurality of scenes from a scene filtering service, the request comprising the access token; (4) identifying the user entitlements from the access token; (5) retrieving the requested scene comprising a subset of the elements; (6) adding the elements that the user is entitled to based on the user entitlements to a scene to be displayed; (7) returning the scene to be displayed to the computer program; and (8) displaying the scene to be displayed.
There are provided systems and methods for minimizing total emissions during distributed processing. For example, there is provided a method residing as instructions on a non-transitory computer-readable medium. The instructions are configured to cause a processor to perform certain operations. The operations can include receiving a request for access to a resource, and determining, based on the request, a usage profile. The operations may further include executing, based on the usage profile, a search for an available resource corresponding to one or more attributes of the usage profile. Furthermore, the operations may include, in response to finding the available resource, providing access to the available resource, tracking a plurality of parameters associated with the available resource upon the available resource being used after the providing.
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software in the nature of a mobile application for brokerage and trading of investments, securities, stocks, bonds, capital investments, and equities; downloadable software in the nature of a mobile application for providing information in the field of finance, securities trading, investments, securities brokerage; downloadable podcasts in the field of financial news and information. Electronic financial securities and trading services for others; margin lending, namely, money lending that allows the borrower to invest the money; financial services, namely, investment brokerage and electronic trading services for securities, stocks, bonds, capital investments, and equities; financial investment brokerage services; providing financial information in the fields of investment and finance over computer networks and global communication networks; financial information provided by electronic means in the field of finance, securities trading, investments, securities brokerage; electronic financial trading services; electronic financial trading services for others via a global computer network; cash management services; issuing of debit cards; debit card transaction processing services; providing financial information in the fields of real time financial market data, securities, stocks, bonds, capital investments, and equities; cryptocurrency trading services; providing access to financial information, namely stock research reports; providing financial news and information; investment banking services; investment fund management services; investment advisory services; capital investment services; financial analysis; financial advice; financial asset management; Providing a website featuring non-downloadable publications in the nature of articles in the field of financial news and information; providing a website featuring on-line electronic newsletters in the field of financial news and information via e-mail; providing a website featuring non-downloadable videos in the field of financial news and information; providing online blogs in the field of financial news and information. Providing on-line electronic newsletters by e-mail in the field of financial news and information; educational services, namely, providing educational podcasts in the field of financial news and information. Providing temporary use of non-downloadable computer software via an online platform for brokerage and trading of investments, securities, stocks, bonds, capital investments, and equities; providing temporary use of non-downloadable computer software via an online platform for providing information in the field of finance, securities trading, investments, securities brokerage.
09 - Scientific and electric apparatus and instruments
36 - Financial, insurance and real estate services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software in the nature of a mobile application for brokerage and trading of investments, securities, stocks, bonds, capital investments, and equities; downloadable software in the nature of a mobile application for providing information in the field of finance, securities trading, investments, securities brokerage; downloadable podcasts in the field of financial news and information. Electronic financial securities and trading services for others; margin lending, namely, money lending that allows the borrower to invest the money; financial services, namely, investment brokerage and electronic trading services for securities, stocks, bonds, capital investments, and equities; financial investment brokerage services; providing financial information in the fields of investment and finance over computer networks and global communication networks; financial information provided by electronic means in the field of finance, securities trading, investments, securities brokerage; electronic financial trading services; electronic financial trading services for others via a global computer network; cash management services; issuing of debit cards; debit card transaction processing services; providing financial information in the fields of real time financial market data, securities, stocks, bonds, capital investments, and equities; cryptocurrency trading services; providing access to financial information, namely stock research reports; providing financial news and information; investment banking services; investment fund management services; investment advisory services; capital investment services; financial analysis; financial advice; financial asset management; Providing a website featuring non-downloadable publications in the nature of articles in the field of financial news and information; providing a website featuring on-line electronic newsletters in the field of financial news and information via e-mail; providing a website featuring non-downloadable videos in the field of financial news and information; providing online blogs in the field of financial news and information. Providing on-line electronic newsletters by e-mail in the field of financial news and information; educational services, namely, providing educational podcasts in the field of financial news and information. Providing temporary use of non-downloadable computer software via an online platform for brokerage and trading of investments, securities, stocks, bonds, capital investments, and equities; providing temporary use of non-downloadable computer software via an online platform for providing information in the field of finance, securities trading, investments, securities brokerage.
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Financial services, namely, electronic funds transfer; clearing and reconciling financial transactions via a global computer network and wireless networks; providing a wide variety of payment and financial services; digitized financial assets and fund vehicles, namely investment fund vehicles and digital representations of equities, fixed income, cash, and derivatives; payment processing services, namely, providing virtual currency transaction processing services for others; financial services, namely, providing financial exchange services for stablecoin currency, virtual currency, digital currency, digital financial tokens, and cryptocurrency for use by others; financial services, namely, virtual currency, digital currency, stablecoin, and cryptocurrency transfer, trading, exchange, and payment processing services; electronic transfer of cryptocurrency, digital currency, stablecoins, digital and blockchain financial assets, digitized financial assets, digital financial tokens, crypto tokens and utility financial tokens; electronic wallet services for trading, storing, sending, receiving, validating, verifying, accepting, tracking, transferring, and transmitting virtual currency, and managing virtual currency payment and exchange transactions, financial transaction services, namely, providing secure commercial transaction options, secure commercial payment options, secure personal payment options, and secure electronic funds transfer options and permitting account holders to make payment requests, financial services, namely, electronic payment services involving electronic processing of payroll payments; merchant services, namely, payment transaction processing services, none of the aforementioned services are intended to be used in relation to any crypto, digital, or tokenized currency that is based solely upon gold and/or silver Providing temporary use of online non-downloadable software for processing electronic payments; providing temporary use of online non-downloadable software for creating, preparing, managing, sending, processing, tracking, and reconciling investor and transactional information; providing temporary use of online non-downloadable software for electronic funds transfer; providing temporary use of online non-downloadable software for sending, receiving, accepting, buying, selling, storing, transmitting, validating, verifying, tracking, transferring, trading and exchanging digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for digital currency payment and exchange transactions; providing temporary use of online non-downloadable software for use in issuing digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for managing digital currency, virtual currency, cryptocurrency, stablecoin, digital and blockchain asset, digitized asset, digital token, crypto token and utility token payments, money transfers, and commodity transfers; providing temporary use of online non-downloadable software for use with digital currency wallet and storage services; providing temporary use of online non-downloadable software for use as an electronic wallet; providing temporary use of online non-downloadable software for facilitating electronic commerce transactions, none of the aforementioned services are intended to be used in relation to any crypto, digital, or tokenized currency that is based solely upon gold and/or silver
100.
SYSTEMS AND METHODS FOR TOKEN VERSIONING AND REISSUE
A method may include a tokenization service: receiving, from a token management system, a namespace and a plurality of token parameters for the namespace; receiving a one-time load of a plurality of primary account numbers from the token management system; generating a token corresponding to each of the plurality of primary account numbers using the token parameters; storing a mapping of the plurality of tokens to the primary account numbers in the namespace; providing the plurality of tokens to the token management system; receiving, in response to a token refresh event, a new namespace and new token parameters from the token management system; generating a new token corresponding to each of the primary account numbers using the new token parameters; storing a mapping of the plurality of new tokens to the primary account numbers; and providing the plurality of new tokens to the token management system.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes