2025
|
G/S
|
Computer software application for mobile devices, namely, computer software for monitoring, manag... |
|
Invention
|
Secure resource management to prevent fraudulent resource access.
Systems and methods for secure... |
|
Invention
|
Automated path-based recommendation for risk mitigation.
Systems and methods for automated path-... |
|
Invention
|
Confirming authenticity of a user to a third-party system.
A telecommunications network server s... |
|
Invention
|
Creating predictor variables for prediction models from unstructured data using natural language ... |
|
G/S
|
Consulting services in the field of life, health, property and casualty insurance; consulting ser... |
|
Invention
|
Historical risk assessment for risk mitigation in online access control.
Systems and methods for... |
|
Invention
|
Device-agnostic access control techniques.
A system can efficiently control access to an interac... |
|
Invention
|
Machine-learning techniques of using tabularized data to predict missing values. In some aspects,... |
2024
|
Invention
|
Artificial intelligence model for controlling interaction dispute. A system can be used to provid... |
|
Invention
|
Machine-learning techniques with large graphs. A method includes determining, using a trained mac... |
|
Invention
|
Machine-learning techniques with large graphs. A computing system can generate and train a machin... |
|
Invention
|
Data validation techniques for sensitive data migration across multiple platforms.
Techniques fo... |
|
Invention
|
Training or using sets of explainable machine-learning modeling algorithms for predicting timing ... |
|
Invention
|
Enhanced rank-order for risk assessment using parameterized decay. A system can receive data abou... |
|
Invention
|
Third-party access-control support using role history analysis.
Various aspects of the present d... |
|
Invention
|
System and methods for fairness evaluation in modelled systems. In one example, a method includes... |
|
Invention
|
System and method for controlling access to a resource based on a compliance score.
A system can... |
|
Invention
|
System and method for controlling resource management using machine learning. In some aspects, a ... |
|
Invention
|
Artificial intelligence techniques for identifying identity manipulation. A system can efficientl... |
|
Invention
|
Controlling access using a risk indicator generated with alternative data. In some aspects, a com... |
|
Invention
|
Constrained non-linear hybrid models for prediction from multiple data sources. In some aspects, ... |
|
Invention
|
Universal digital identity authentication service.
The present disclosure involves systems and m... |
|
Invention
|
Data compression techniques for machine learning models.
In some aspects, techniques for creatin... |
|
Invention
|
Machine-learning techniques for predicting unobservable outputs. In some aspects, a computing sys... |
|
Invention
|
Techniques for automatically controlling access to secured resources.
A system can generate a ri... |
|
Invention
|
Secure resource management to prevent resource abuse.
Systems and methods for secure resource ma... |
|
Invention
|
Confirming authenticity of a user to a third-party system. A telecommunications network server sy... |
|
Invention
|
Applying natural language processing (nlp) techniques to time series data to derive attributes fo... |
|
Invention
|
Machine-learning techniques involving monotonic recurrent neural networks.
Various aspects invol... |
|
Invention
|
Automatically generating search indexes for expediting searching of a computerized database. Sear... |
|
Invention
|
Systems and methods for controlling access to computing systems based on dynamic state informatio... |
|
G/S
|
Employment verification services Platform as a Service (PAAS) featuring non-downloadable software... |
|
Invention
|
Risk assessment techniques for controlling access to computing systems based on event analysis. A... |
|
Invention
|
Flexible risk assessment techniques for controlling access to computing systems. A system can gen... |
2023
|
Invention
|
Risk assessment for personally identifiable information associated with controlling interactions ... |
|
Invention
|
Artificial intelligence model for facilitating reversed interaction. A system can be used to cont... |
|
Invention
|
Artificial intelligence model for controlling interaction dispute.
A system can be used to provi... |
|
Invention
|
Temporal identity graph. A system can generate an identity graph that can be arranged temporally ... |
|
Invention
|
Artificial intelligence techniques for identifying identity manipulation.
A system can efficient... |
|
Invention
|
Machine-learning techniques for predicting unobservable outputs.
In some aspects, a computing sy... |
|
Invention
|
Similarity hashing for access control.
A system can efficiently control access to an interactive... |
|
Invention
|
Techniques for mitigating back pressure, auto-scaling throughput, and concurrency scaling in larg... |
|
Invention
|
Precursor learning for label refinement of machine learning training signals. Systems and methods... |
2022
|
Invention
|
Machine-learning for content interaction. A system can generate content recommendations and facil... |
|
Invention
|
Explainable machine learning based on wavelet analysis.
A method can be used to predict risk and... |
|
G/S
|
Providing online non-downloadable software for use by employers, credit reporting agencies, gover... |
|
G/S
|
Providing temporary use of non-downloadable computer software for use in Employment verification,... |
|
Invention
|
Configuration of user interface for risk assessment visualization.
In some embodiments, a data v... |
2021
|
Invention
|
Explainable machine learning based on time-series transformation.
Various aspects involve explai... |
|
G/S
|
Computer application software for mobile devices, namely,
software for accessing, monitoring, ma... |
|
Invention
|
Fragmented record detection based on records matching techniques.
In some aspects, a record-matc... |
|
Invention
|
Records matching techniques for facilitating database search and fragmented record detection.
In... |
|
G/S
|
Providing online non-downloadable software for use by employers, namely, software for providing a... |
|
G/S
|
Providing employment verification in the nature of verifying employment eligibility status and pr... |
|
G/S
|
Downloadable computer application software for mobile devices in the nature of mobile phones, tab... |
|
G/S
|
Providing financial information, data, and reports in the field of consumer credit, credit scores... |
|
G/S
|
Computer application software for mobile devices, namely, software for accessing, monitoring, man... |
2020
|
G/S
|
Software as a services (SAAS) services featuring software for risk analysis, identity verificatio... |
|
G/S
|
Software as a services (SAAS) services for risk analysis,
identity verification, identity authen... |
2019
|
G/S
|
Software as a service (SAAS) services featuring software for providing and analyzing marketing in... |
|
G/S
|
marketing services; marketing attribution services, namely, providing marketing information repor... |
|
G/S
|
Financial services, namely, providing financial information, data, and customized models, analyti... |
|
G/S
|
Advertising; business management; business administration; marketing. Providing non-downloadable ... |
2018
|
G/S
|
Providing temporary use of non-downloadable software for source verification and authentication f... |
|
G/S
|
Commercial information agency services for businesses in the
areas of real estate, property valu... |
|
G/S
|
Financial services, namely, providing financial credit risk
and credit score analysis services f... |
|
G/S
|
Downloadable software in the nature of a mobile application
for source verification and authenti... |
2017
|
G/S
|
Financial services, namely providing customer acquisition, customer management, fraud evaluation ... |
|
G/S
|
Commercial information agency services for businesses in the areas of real estate, property valua... |
|
G/S
|
Financial services, namely, providing financial credit risk and credit score analysis services fo... |
|
G/S
|
Downloadable software in the nature of a mobile application for source verification and authentic... |
|
G/S
|
Printed materials and publications, namely, brochures, informational sheets, instruction sheets, ... |
2016
|
G/S
|
[ Downloadable software and mobile applications for use by employers in managing the hiring of em... |
|
G/S
|
Financial services, namely, providing both current and historical credit scoring and financial in... |
|
G/S
|
Platform as a service (PAAS) featuring computer software platforms for use in connection with eva... |
2015
|
G/S
|
Commercial information agency services for businesses; providing databases in the field of busin... |
|
G/S
|
Providing non-downloadable software for risk analysis, identity verification, data analysis, risk... |
2014
|
G/S
|
Platform as a service (PAAS) featuring computer software platforms for the processing of ecommerc... |
2012
|
G/S
|
Validation of addresses used by others
Validation of telephone numbers used by others
Telephone n... |
|
G/S
|
Commercial information agency services for businesses, namely, compiling consumer demographic, li... |
|
G/S
|
Credit information services, namely, providing information relating to applicants for credit; cre... |
2009
|
G/S
|
Providing business information services based on a tracking system that will allow users to ident... |
|
G/S
|
Credit risk scoring services; developing and administering a credit risk delinquency score system. |