A method and system for using AI techniques to monitor the performance of an AI model and automatically perform an appropriate corrective action when necessary are provided. The method includes: receiving first data that relates to an AI model; generating, based on the received first data, at least one key performance indicator (KPI) that relates to the AI model; comparing each of the at least one KPI to at least one configurable threshold; assigning, based on a result of the comparing, a model health rating; and when the model health rating is less than a predetermined minimum acceptable health rating, performing, by the at least one processor, at least one corrective action that causes an increase in the model health rating.
Provided is a method for implementation of an application running on a computer having a processor and a memory or a cloud infrastructure, receiving a request from a user, via a gateway manager, to initiate a future payment transaction in accordance with a selected one of a plurality of payment transaction types. The method also includes comparing, via an allocation engine, the requested future payment transaction with patterns derived from an analysis of stored previous payment transactions associated with the user, wherein the patterns represent an association of each of the payment transaction types with one of a plurality of different types of vendors from the stored previous payment transactions. A payment transaction type is automatically selected for the future payment transactions based on the comparison.
A method for performing a determination of voter eligibility and facilitation of secure electronic voting is provided. The method includes authenticating a voter according to security setting and displaying a voting page for a jurisdiction corresponding to the voter's residence. The method then transmits to an adjudicating entity, voter information for determination of voter eligibility, and stores the voter information in a non-public blockchain. The method further includes determining whether the voter is eligible to vote based on the voter information stored in the non-public blockchain, generating a unique voter specific ballot for the voter in response to a determination that the voter is eligible to vote, and transmitting, to the adjudicating entity, a ballot selection received from the voter. The ballot selection is then stored on a public blockchain, and made available for release.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
4.
METHODS, SYSTEMS, AND DEVICES FOR SCALABLE MACHINE LEARNING MODEL INFRASTRUCTURE
Aspects of the subject disclosure may include, for example, obtaining a processing capacity associated with a machine learning model and obtaining a memory capacity associated with the machine learning model, and obtaining a processing capacity threshold and obtaining a memory capacity threshold. Further embodiments include provisioning a head node and a first group of worker nodes based on the processing capacity, the memory capacity, the processing capacity threshold, and the memory capacity threshold, provisioning a first portion of data engineering pipeline on each of the first group of worker nodes, and provisioning a first portion of the machine learning model on each of the first group of worker nodes. Other embodiments are disclosed.
Systems and methods for network-based delivery of dynamic content are disclosed. A method may include: receiving, by a network computer program, a location for a customer electronic device associated with a customer; determining, by the network computer program and from the location, that the customer is within a predetermined distance of a merchant; requesting, by the network computer program, content for one or more payment card issued by an issuer to the customer from an issuer backend for the issuer; receiving, by the network computer program, the content; and communicating, by the network computer program, the content to a merchant backend for the merchant. The merchant backend receives, from a merchant point of sale device, payment card information for one of the payment cards, retrieves the content for the payment card, and causes the merchant point of sale device to display the content on a display.
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
6.
SYSTEM FOR OPTIMIZED TRANSMISSION LOG STORAGE AND RETRIEVAL
A system for implementing a transmission log bucketing tool that provides an optimized transmission log storage and retrieval scheme. The system may comprise a processor and memory storing instructions that cause the processor to perform operations. The operations may comprise generating a manifest that comprises a transmission log table, obtaining a first set of transmission logs, evaluating the first set of transmission logs against the manifest to determine a first set of respectively corresponding shard keys, and utilizing the first set of respectively corresponding shard keys to at least one from among store the first set of transmission logs and retrieve the first set of transmission logs.
G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet
G06F 16/22 - IndexationStructures de données à cet effetStructures de stockage
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
7.
System and method for generating order agnostic dynamic citation network
A method and system for generating a dynamic graph network for a plurality of documents in a corpus are disclosed. The method includes analyzing a first document among the plurality of documents included in the corpus; generating a first node for the first document in the dynamic graph network; extracting one or more values included in the first document; assigning a key for each of the one or more values included in the first document; identifying at least one entity for the one or more values extracted from the first document; generating a second node for the at least one entity in the dynamic graph network; setting a status identifier for each of the first node and the second node generated; generating a first edge for the first node and the second node; and establishing a connection between the first node and the second node via the first edge.
A method and system for verifying a structured query language (SQL) query are provided. The method includes: receiving a first request to retrieve first data that is accessible via a database; identifying an intention of the first request; generating, based on the first request, a first SQL query to retrieve the first data from the database; predicting, based on the generated first SQL query, an output of the generated first SQL query; determining whether the predicted output matches the identified intention of the first request; generating, based on the determining of whether the predicted output matches the identified intention of the first request, a second SQL query to retrieve the first data that is accessible via the database, when the predicted output of the first SQL query does not match the identified intention of the first request.
A method may include: (1) generating, by a classical computer program executed by a client electronic device, a pseudorandom graph having a depth, a number of nodes based on a number of qubits in a quantum computer, and edges between the nodes; (2) creating, by the classical computer program, a coloring of the graph such that no two edges that share a node have the same color; (3) creating, by the classical computer program, a graph coloring layer for each color that includes edges with that color; (4) generating, by the classical computer, a quantum circuit from the graph coloring layers; (5) estimating, by the classical computer program, a cost of validating the quantum circuit; (6) determining, by the classical computer program, that the cost is acceptable; and (7) saving, by the classical computer program, the quantum circuit in response to the cost being acceptable.
A method may include: (1) querying, by a randomness computer program executed by a randomness electronic device, a quantum randomness source for a plurality of sequences of random bits; (2) receiving, by the randomness computer program, the plurality of sequences of random bits; (3) saving, by the randomness computer program, the plurality of sequences of random bits in a randomness pool; (4) receiving, by the randomness computer program, a request for randomness from a client randomness computer program executed by a client electronic device; (5) drawing, by the randomness computer program, a subset of the plurality of sequences of random bits from the randomness pool; (6) marking, by the randomness computer program, the subset of the plurality of sequences of random bits as used; and (7) communicating, by the randomness computer program, the subset of the plurality of sequences of random bits to the client randomness computer program.
A system for implementing a resource transmission management tool that processes resource transmissions, the system comprising a processor that is configured to: obtain a first set of requests that comprises a first resource transmission request; transform the first resource transmission request into a first corresponding encoded resource request; generate, by organizing an arrangement of at least the first corresponding encoded resource request, a pre-processed set of requests that comprises the first corresponding encoded resource request; assign, based on a topology of the pre-processed set of requests, a respectively corresponding weight to each transmission request field; analyze the first corresponding encoded resource request according to associated instructions; and generate a response to the associated instructions based on the analysis.
H04L 67/60 - Ordonnancement ou organisation du service des demandes d'application, p. ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises
12.
SYSTEM AND METHOD FOR IMPLEMENTING A MODEL THAT PREDICTS THE PROBABILITY OF HALLUCINATION FOR ANY QUERY IMPOSED TO AN LLM
Various methods and processes, apparatuses or systems, and media for predicting probability of hallucination before generation for a query imposed to a Large Language Model (LLM) are disclosed. A processor causes a trained generative model to receive a query from a user via a user interface operatively connected to the generative model; perturbs the received query n times into unique variations that retain the original semantic meaning of the received query yet significantly diverge lexically; implements n+1 independent agents to sample an output from each query including the original received query; applies the simulation algorithm on the sampled outputs; derives an empirical estimate into an expected rate of hallucination for the original received query as a ground truth for the encoder; and outputs a probability of hallucination value for the query received by the generative model before the LLM generates an output.
G06F 30/27 - Optimisation, vérification ou simulation de l’objet conçu utilisant l’apprentissage automatique, p. ex. l’intelligence artificielle, les réseaux neuronaux, les machines à support de vecteur [MSV] ou l’apprentissage d’un modèle
13.
METHOD AND SYSTEM FOR SECURING LARGE LANGUAGE MODEL SERVICES AGAINST PRIVACY ATTACKS
A system for securing a large language model (LLM) service against LLM privacy attacks. The system may comprise a processor that executes instructions that cause the processor to: interface with each output of the LLM service and each client network of the LLM service; monitor each output of the LLM to detect at least one client query textual response; detect and redact the at least one client query textual response according to an evaluation of that response and at least one current client privilege level that is assigned to at least one target client network account to which the at least one client query textual response is directed; and transmit a result of the redacting to a client device of the at least one target client network account.
A method and system for providing end-to-end observability for distributed event-driven applications are disclosed. The method includes generating a trace for an executed transaction and decomposing the generated trace into multiple synthetic traces or sub-traces. Each of the synthetic traces or sub-traces represents an operation performed for a discrete application function contained within that transaction. For each sub-trace a synthetic root span is generated, the root span representing an end-to-end time to process the respective application function.
G06F 16/00 - Recherche d’informationsStructures de bases de données à cet effetStructures de systèmes de fichiers à cet effet
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
H04L 69/22 - Analyse syntaxique ou évaluation d’en-têtes
15.
System and method for grounding outputs in tabular generative artificial intelligence
Various methods and processes, apparatuses or systems, and media for generating a grounded answer to a query using a corresponding table are disclosed. The present disclosure provides decomposing a complex query into natural-language sub-queries or steps, which are then translated into database manipulation commands to sequentially transform input table into intermediate or simplified tables, until the input table is simplified for performing a final decision query. Each of the sub-queries may be associated with corresponding intermediate or simplified tables to ground the sub-queries.
There is provided a method residing as instructions on a non-transitory computer-readable medium, the instructions being configured to cause a processor to perform operations comprising receiving a request, the request being associated with a batch process for manipulating a dataset. The method also includes receiving a deadline by which the request must be executed, evaluating a set of requirements for executing the request by the deadline, entering the request into a queue, the queue being associated with a hardware location physically hosting the dataset, and determining an optimum time within the deadline for executing the request.
A system and method for detecting driver of variance are disclosed. The method includes receiving dependent variable(s) (y) and a set of independent variables (Xn). Next, the method includes computing a correlation (Rxx) between at least two of the independent variables and then calculating a partial effect (β) of each of the independent variables on the dependent variable(s) (y). The method includes estimating a row relative weight as a percentage of coefficient of determination R2 based on a sum of squared values of the calculated partial effect of the independent variables. The method includes determining a distance from median of x-coordinate (DFM x) and y-coordinate (DFM y) of the set of independent variables. The method includes detecting and displaying at least one driver of variance calculated via a weighted Euclidean distance calculated based on the DFM x and DFM y, and the estimated row relative weight.
A foam-water fire sprinkler includes a nozzle, a shroud body, an agitator, and a deflector. The nozzle defines a nozzle passage that receives a foam-water solution therein. The shroud body defines a shroud passage that receives the foam-water solution from the nozzle passage. The agitator is positioned within the shroud passage, and has a rounded agitator portion and a straight agitator portion that extends from the rounded agitator portion. The foam-water solution impinges on the agitator at the rounded agitator portion to aspirate the foam-water solution with air to generate foam. A portion of the foam-water solution separates from the agitator at the straight agitator portion. The deflector deflects the foam-water solution and the foam to generate a spray pattern of the foam-water solution and the foam at a coverage area.
Systems and methods for immersive data management in spatial computing are disclosed. A method may include: (1) requesting from an identity and access management service executed in a cloud environment, an access token; (2) receiving, from an identity and access management service, the access token comprising user entitlements to access a plurality of elements in a plurality of scenes; (3) requesting one of the plurality of scenes from a scene filtering service, the request comprising the access token; (4) identifying the user entitlements from the access token; (5) retrieving the requested scene comprising a subset of the elements; (6) adding the elements that the user is entitled to based on the user entitlements to a scene to be displayed; (7) returning the scene to be displayed to the computer program; and (8) displaying the scene to be displayed.
There are provided systems and methods for minimizing total emissions during distributed processing. For example, there is provided a method residing as instructions on a non-transitory computer-readable medium. The instructions are configured to cause a processor to perform certain operations. The operations can include receiving a request for access to a resource, and determining, based on the request, a usage profile. The operations may further include executing, based on the usage profile, a search for an available resource corresponding to one or more attributes of the usage profile. Furthermore, the operations may include, in response to finding the available resource, providing access to the available resource, tracking a plurality of parameters associated with the available resource upon the available resource being used after the providing.
G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
09 - Appareils et instruments scientifiques et électriques
36 - Services financiers, assurances et affaires immobilières
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software in the nature of a mobile application for brokerage and trading of investments, securities, stocks, bonds, capital investments, and equities; downloadable software in the nature of a mobile application for providing information in the field of finance, securities trading, investments, securities brokerage; downloadable podcasts in the field of financial news and information. Electronic financial securities and trading services for others; margin lending, namely, money lending that allows the borrower to invest the money; financial services, namely, investment brokerage and electronic trading services for securities, stocks, bonds, capital investments, and equities; financial investment brokerage services; providing financial information in the fields of investment and finance over computer networks and global communication networks; financial information provided by electronic means in the field of finance, securities trading, investments, securities brokerage; electronic financial trading services; electronic financial trading services for others via a global computer network; cash management services; issuing of debit cards; debit card transaction processing services; providing financial information in the fields of real time financial market data, securities, stocks, bonds, capital investments, and equities; cryptocurrency trading services; providing access to financial information, namely stock research reports; providing financial news and information; investment banking services; investment fund management services; investment advisory services; capital investment services; financial analysis; financial advice; financial asset management. Providing a website featuring non-downloadable publications in the nature of articles in the field of financial news and information; providing a website featuring on-line electronic newsletters in the field of financial news and information via e-mail; on-line electronic newsletters delivered by e-mail in the field of financial news and information; educational services, namely, providing educational podcasts in the field of financial news and information; providing a website featuring non-downloadable videos in the field of financial news and information; online blog in the field of financial news and information. Providing temporary use of non-downloadable computer software via an online platform for brokerage and trading of investments, securities, stocks, bonds, capital investments, and equities; providing temporary use of non-downloadable computer software via an online platform for providing information in the field of finance, securities trading, investments, securities brokerage.
09 - Appareils et instruments scientifiques et électriques
36 - Services financiers, assurances et affaires immobilières
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software in the nature of a mobile application for brokerage and trading of investments, securities, stocks, bonds, capital investments, and equities; downloadable software in the nature of a mobile application for providing information in the field of finance, securities trading, investments, securities brokerage; downloadable podcasts in the field of financial news and information. Electronic financial securities and trading services for others; margin lending, namely, money lending that allows the borrower to invest the money; financial services, namely, investment brokerage and electronic trading services for securities, stocks, bonds, capital investments, and equities; financial investment brokerage services; providing financial information in the fields of investment and finance over computer networks and global communication networks; financial information provided by electronic means in the field of finance, securities trading, investments, securities brokerage; electronic financial trading services; electronic financial trading services for others via a global computer network; cash management services; issuing of debit cards; debit card transaction processing services; providing financial information in the fields of real time financial market data, securities, stocks, bonds, capital investments, and equities; cryptocurrency trading services; providing access to financial information, namely stock research reports; providing financial news and information; investment banking services; investment fund management services; investment advisory services; capital investment services; financial analysis; financial advice; financial asset management. Providing a website featuring non-downloadable publications in the nature of articles in the field of financial news and information; providing a website featuring on-line electronic newsletters in the field of financial news and information via e-mail; on-line electronic newsletters delivered by e-mail in the field of financial news and information; educational services, namely, providing educational podcasts in the field of financial news and information; providing a website featuring non-downloadable videos in the field of financial news and information; online blog in the field of financial news and information. Providing temporary use of non-downloadable computer software via an online platform for brokerage and trading of investments, securities, stocks, bonds, capital investments, and equities; providing temporary use of non-downloadable computer software via an online platform for providing information in the field of finance, securities trading, investments, securities brokerage.
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Financial services, namely, electronic funds transfer; clearing and reconciling financial transactions via a global computer network and wireless networks; providing a wide variety of payment and financial services; digitized financial assets and fund vehicles, namely investment fund vehicles and digital representations of equities, fixed income, cash, and derivatives; payment processing services, namely, providing virtual currency transaction processing services for others; financial services, namely, providing financial exchange services for stablecoin currency, virtual currency, digital currency, digital financial tokens, and cryptocurrency for use by others; financial services, namely, virtual currency, digital currency, stablecoin, and cryptocurrency transfer, trading, exchange, and payment processing services; electronic transfer of cryptocurrency, digital currency, stablecoins, digital and blockchain financial assets, digitized financial assets, digital financial tokens, crypto tokens and utility financial tokens; electronic wallet services for trading, storing, sending, receiving, validating, verifying, accepting, tracking, transferring, and transmitting virtual currency, and managing virtual currency payment and exchange transactions, financial transaction services, namely, providing secure commercial transaction options, secure commercial payment options, secure personal payment options, and secure electronic funds transfer options and permitting account holders to make payment requests, financial services, namely, electronic payment services involving electronic processing of payroll payments; merchant services, namely, payment transaction processing services, none of the aforementioned services are intended to be used in relation to any crypto, digital, or tokenized currency that is based solely upon gold and/or silver Providing temporary use of online non-downloadable software for processing electronic payments; providing temporary use of online non-downloadable software for creating, preparing, managing, sending, processing, tracking, and reconciling investor and transactional information; providing temporary use of online non-downloadable software for electronic funds transfer; providing temporary use of online non-downloadable software for sending, receiving, accepting, buying, selling, storing, transmitting, validating, verifying, tracking, transferring, trading and exchanging digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for digital currency payment and exchange transactions; providing temporary use of online non-downloadable software for use in issuing digital currency, virtual currency, cryptocurrency, stablecoins, digital and blockchain assets, digitized assets, digital tokens, crypto tokens and utility tokens; providing temporary use of online non-downloadable software for managing digital currency, virtual currency, cryptocurrency, stablecoin, digital and blockchain asset, digitized asset, digital token, crypto token and utility token payments, money transfers, and commodity transfers; providing temporary use of online non-downloadable software for use with digital currency wallet and storage services; providing temporary use of online non-downloadable software for use as an electronic wallet; providing temporary use of online non-downloadable software for facilitating electronic commerce transactions, none of the aforementioned services are intended to be used in relation to any crypto, digital, or tokenized currency that is based solely upon gold and/or silver
25.
METHOD AND SYSTEM FOR EVALUATION OF CODE GENERATION BY LARGE LANGUAGE MODEL
A method and a system for obtaining an evaluation of a quality of software code that is generated by using a large language model (LLM) are provided. The method includes: receiving a set of instructions for performing a task and generating an output; providing, as an input to an LLM, a list of available application programming interfaces (APIs) and the instructions, together with a submission of a request to the LLM to select one API and to generate a set of executable code based on the instructions; receiving, from the LLM, a selection of one API and the set of executable code; executing the set of executable code in order to perform the first task and generate the output; and evaluating an accuracy, a robustness, and/or a consistency of the set of executable code.
A method for generating customized model explanations via a model is disclosed. The method includes generating, via the model, a prompt in a natural language format based on a received request for an explanation of model outputs, the request including feature attributions and corresponding subject information; modifying, via the model, the prompt based on predetermined guidelines to generate a test response; validating, via the model, the test response by determining whether errors are detected in the test response; performing, via the model when the errors are detected, corrective actions that resolve each of the detected errors by altering the prompt; tuning, via the model, the altered prompt based on response attributes; and generating, via the model, a model explanation in the natural language format based on the tuned prompt.
A method may include a tokenization service: receiving, from a token management system, a namespace and a plurality of token parameters for the namespace; receiving a one-time load of a plurality of primary account numbers from the token management system; generating a token corresponding to each of the plurality of primary account numbers using the token parameters; storing a mapping of the plurality of tokens to the primary account numbers in the namespace; providing the plurality of tokens to the token management system; receiving, in response to a token refresh event, a new namespace and new token parameters from the token management system; generating a new token corresponding to each of the primary account numbers using the new token parameters; storing a mapping of the plurality of new tokens to the primary account numbers; and providing the plurality of new tokens to the token management system.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
28.
SYSTEM AND METHOD FOR WATERMARKING TABULAR DATA WHILE OBSCURING UNDERLYING DATA FOR IMPROVING DATA INTEGRITY AND SECURITY
A method and system for watermarking a dataset generated by a source system are disclosed. The method includes acquiring the dataset, distributing data elements included in the dataset over a range, and dividing the range into multiple bins according to a scheme. The method further includes designating each of the bins as a first or second type, tagging each data element according to according to a bin type of a bin the respective data element falls into. For each data element included in a bin of the second type, selecting a new value by sampling within a nearest bin of the first type and replacing the respective data element with a replacement data element including the new value, and watermarking each of the data elements originally included in the bins of the first type and replacement data elements for generating a watermarked dataset.
A client network expansion system that: converts at least one from among a first rule and a first trend into a first set of code; stores the first set of code within a first repository of strategies; receives a first request that is associated with a new set of client details; based on the first repository of strategies, transforms a new set of client details into at least one new quantification of a first set of client attributes; determines whether the at least one new quantification meets a first set of criteria for a first client network; and adds a new client to the first client network when the determination is made that the at least one new quantification meets the first set of criteria.
H04L 41/0823 - Réglages de configuration caractérisés par les objectifs d’un changement de paramètres, p. ex. l’optimisation de la configuration pour améliorer la fiabilité
H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
H04L 41/12 - Découverte ou gestion des topologies de réseau
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
41 - Éducation, divertissements, activités sportives et culturelles
Produits et services
Providing digital music from the Internet, not downloadable; Providing online music, not downloadable; Entertainment services, namely, providing non-downloadable playback of music via global communications networks
31.
Method and system for dynamic data partitioning and efficient polling in distributed microservices architecture
A method and a system for utilizing dynamic data partitioning to ensure consistency of event publications with associated business transactions in a distributed microservices architecture in order to optimize efficiency in polling data are provided. The method includes: defining a hash space that includes a range of assignable hash values; deploying a respective instance of each microservice to form a cluster of microservices within the distributed microservices architecture; allocating a respective subset of the hash space to each microservice; and facilitating a data polling capability with respect to a data table based on the allocated respective subset of the hash space and the deployed respective instance for each microservice.
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
G06F 16/22 - IndexationStructures de données à cet effetStructures de stockage
Systems and methods for anomaly detection in network devices are disclosed. A method may include: receiving a plurality of log messages from a data source; creating an offline anomaly detection model by: performing statistical modelling on the log messages from each network device; creating a log template for each log message based on static and variables parts of the log message; creating a template dictionary of log templates for each network device; creating a log template distribution; and creating template variables; receiving streaming data comprising log files from a plurality of network devices; aggregating the streaming data for each network device for a period of time; identifying an anomaly in the aggregated streaming data using the offline anomaly detection model; classifying the anomaly as a rate anomaly, a time anomaly, or a variable anomaly; and executing a self-healing action based on the classification.
Provided is a system and method for identifying anomaly patterns for card transactions within a consumer banking environment that includes retrieving, card transaction data, filtering and storing the debit card transaction data as raw data, processing the raw data in real-time, by detecting card transaction declines within the raw data, identifying, in real-time via a machine learning model, anomaly patterns associated with the card transaction declines detected; and generating at least one graphical illustration associated with the anomaly patterns identified, to be accessible via a user interface.
Multi-material cards with antennas are disclosed. A transaction card may include a card substrate having an antenna recess; an antenna received in the antenna recess; a chip opening in the antenna recess; a chip received in the chip opening, wherein the antenna is in electrical communication with the chip; and a non-blocking material positioned over the chip and the antenna in the antenna recess; wherein the non-blocking material allows radio frequency waves to pass to the antenna.
G06K 19/077 - Détails de structure, p. ex. montage de circuits dans le support
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p. ex. forme, nature, code
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Providing a website featuring non-downloadable software using artificial intelligence (AI) for searching and making reservations and bookings for temporary lodging and accommodations, restaurants and meals, hotels, and tours and visits to local attractions; Providing temporary use of online non-downloadable chatbot software using artificial intelligence (AI) for engaging in conversations for purposes of providing assistance and advice regarding travel planning, and for providing servicing support for existing booked travel components, namely, making, changing, or updating travel itineraries; Providing temporary use of on-line non-downloadable software for performing agentic tasks; Providing temporary use of on-line non-downloadable software and applications using artificial intelligence (AI) for analyzing and taking actions in response to content in the form of text, audio, or images, accessible via a website, mobile application, and social media platforms; Providing temporary use of on-line non-downloadable software for facilitating multi-modal natural language, speech, text, image, video, and sound input; Providing temporary use of on-line non-downloadable software and applications using artificial intelligence (AI) for simulating conversations, analyzing images, summarizing text, creating content, suggesting trip itineraries, and managing travel plans, reservations, and bookings; Providing a website featuring non-downloadable software using artificial intelligence (AI) for multi-modal communication, including interactive forms, chatbots, conversational agents, voice assistants, and other automated technologies designed to assist users in searching, planning, and making travel arrangements; Providing temporary use of on-line non-downloadable software for for use in providing a virtual assistant which enables natural language understanding, machine learning, and artificial intelligence capable of multi-modal interaction with a user; Providing on-line non-downloadable software using artificial intelligence (AI) for travel agency services, namely, searching and making reservations and bookings for temporary lodging and accommodations, restaurants and meals, hotels, and tours and visits to local attractions
36.
INTELLIGENT ANNOTATION ASSISTANT SYSTEMS AND METHODS USING PROMPT-FREE FEW-SHOT LEARNER FOR ANNOTATION AND CONFIDENT LEARNING BASED LABEL NOISE DETECTOR FOR POST-ANNOTATION
Aspects of the subject disclosure may include, for example, a method including training a first machine learning model to recognize a predetermined named entity in a sentence and a corresponding label, receiving input sentences including a target named entity, receiving a plurality of few-shot examples in a support set, the plurality of few-shot examples including an annotated label for the target named entity, performing annotation on the input sentences with the trained first machine learning model using the plurality of few-shot examples and using no prompt, generating labeled data including the annotated input sentences, performing post-annotation on the labeled data with a second machine learning model that performs confident learning based label noise detection, and generating cleaned labeled data excluding one or more noisy labels from the labeled data. Other embodiments are disclosed.
Systems and methods for using device data to validate a mobile user are disclosed. In accordance with aspects, a method may include receiving, at a backend processing infrastructure of a third party and from a backend processing infrastructure of a mobile application provider, a first copy of location information and an IP address, wherein the location information and the IP address are associated with a mobile device; receiving, at the backend processing infrastructure of the third party and from a mobile application provided by the third party, a second copy of the location information and the IP address, wherein the mobile application provided by the third party is executed on the mobile device; and verifying, by the backend processing infrastructure of the third party, that the first copy of the location information and the IP address matches the second copy of the location information and the IP address.
36 - Services financiers, assurances et affaires immobilières
Produits et services
Providing financial information via a website, namely, providing online credit scoring and financial health services for businesses, namely, credit health evaluation services providing business entities’ credit scores, information about business credit reports, and education regarding how establishing a business credit profile can affect possible future financial outcomes
36 - Services financiers, assurances et affaires immobilières
Produits et services
Providing financial information via a website, namely, providing online credit scoring and financial health services for businesses, namely, credit health evaluation services providing business entities’ credit scores, information about business credit reports, and education regarding how establishing a business credit profile can affect possible future financial outcomes
40.
SYSTEMS AND METHODS FOR RECONCILING SOFTWARE RELEASE SCOPE REQUIREMENTS
Systems and methods for reconciling software release scope requirements are disclosed. A method may include: identifying code release version for a release candidate codebase; retrieving a log of changes made to the release candidate codebase and an implemented requirements identifier for each change; retrieving planned requirements identifiers for the code release version from a code requirements database; comparing the implemented requirements identifiers and the planned requirements identifiers; determining, based on the comparison, that an out-of-scope code change is included in the code release version; reverting the code release version to a prior version of the release candidate codebase that does not include the out-of-scope code change; retaining or reapplying in-scope code changes for the planned requirement identifiers to the prior version of the release candidate codebase; and deploying the prior version of the release candidate codebase with the in-scope changes to a production environment.
A method may include a first verifier computer program receiving an interaction with a first prover computer program for a client that requires verification comprising an identifier for the client; generating a challenge using a public identification key; issuing the challenge to the first prover computer program and to a second prover computer program; receiving a first response from the first prover computer program and a second response from the second prover computer program; determining that the first response and the second response were received within a predetermined amount of time; determining the first response and the second response are consistent; and informing the first prover computer program that the verification was successful.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
42.
SYSTEM AND METHOD FOR OFFLINE DATA-DRIVEN DISCOVERY AND DISTILLATION FOR SEQUENTIAL DECISION-MAKING WITH LARGE LANGUAGE MODELS
A method and system for performing a task requiring a plurality of sequential decision-making operations by an autonomous agent are disclosed. The method includes acquiring a portion of offline data from a database, and discovering a set of separate skills. The method further includes segmenting the offline data and segmenting the offline data according to skill, and abstracting the segmented offline data into reusable functions. From the abstracted reusable functions, distilling primitives for each skill and distilling reusable tips in various functions. Modifying skill based text-based and code-based policies for augmenting the autonomous agent, and processing a task requiring a set of sequential decision-making operations using the augmented autonomous agents.
The techniques described herein relate to a method including: retrieving a subset of data files from an original dataset, wherein data files not included in the subset of data files are a remaining dataset; dividing the subset of data files into an initial training dataset and a validation dataset; executing an in initial training pass on a machine learning model, wherein the initial pass trains the model using the initial training dataset; determining, after the initial pass, a predictive accuracy of the model using the remaining dataset; determining, by a targeted sampling process, a number of least learned data files from the remaining dataset; generating a second training dataset including the number of least learned data files; and executing a second pass on the model, wherein the second pass trains the machine learning model using the second training dataset.
Systems and methods for identifying and remediating architecture design defects are disclosed. In one aspect, a method includes generating a new architecture graph pattern based on an architecture design document of an evaluated architecture; determining a model graph pattern, wherein a shape of the model graph pattern is similar to a shape of the architecture graph pattern; determining, based on a comparison of the shape of the model graph pattern with the shape of the new architecture graph pattern, that the new architecture graph pattern includes a design defect; generating, based on the shape of the model graph pattern, a remediated graph pattern; and determining, based on the differences between the remediated graph pattern and the new architecture graph pattern, a suggested remedial change to the architecture design document.
G06F 30/398 - Vérification ou optimisation de la conception, p. ex. par vérification des règles de conception [DRC], vérification de correspondance entre géométrie et schéma [LVS] ou par les méthodes à éléments finis [MEF]
In some aspects, the techniques described herein relate to a method including: receiving, as input to a binary search process, a subject vector embedding and a class vector embedding, wherein the subject vector embedding is generated from a plurality of subject text strings and wherein the class vector embedding is generated from a class text string; generating a similarity score; determining that the similarity score is below a threshold value; splitting the plurality of subject text strings into a first new plurality of subject text strings and a second new plurality of subject text strings; receiving a new subject vector embedding, wherein the new subject vector embedding is generated from the first new plurality of subject text strings; and calling the binary search process recursively using the new subject vector embedding and the class vector embedding as input to the binary search process.
Aspects of the subject disclosure may be directed to, for example, a method including receiving a first text input that represents entity description at an entity encoder, receiving a second text input that represents Automatic Speech Recognition (ASR) transcription at a text encoder, receiving a third text input that represents ground truth transcription at the text encoder, performing embeddings of the first text input, the second text input, and the third text input, training a natural language processing model, and generating a predicted entity output and a predicted non-entity output using the trained natural language processing model. Other embodiments are disclosed.
Various methods, apparatuses, systems, and media for implementing an application programming interface (API) integration library are disclosed. A receiver receives a user request of a process flow to access one or more resources. A processor creates a configuration file having a reusable and standardized format, wherein the configuration file includes detail data that specifies how the API connects to the one or more resources to execute the user request, how to create a standardized request, how to map a standardized response back in response to the user request, and how to handle retry attempts when the user request fails. The processor also causes a library to receive the configuration file as input that utilizes the configuration file to process the user request. The processor automatically creates, by the library, a desired application as output of the process flow based on the received configuration file.
A method for using a privacy preserving linear optimization technique to perform computations on encrypted data while ensuring that the original data remains confidential and secure from any unauthorized access based on secure multi-party computation is provided. The method includes: receiving, from each of several entities, a respective input that includes encrypted data; constructing a table that includes first information that relates to an objective function, second information that relates to a boundary value, and third information that relates to a polynomial function that is applicable to each respective input; and determining a value that maximizes the polynomial function subject to a constraint that a result of applying the objective function to the value is less than or equal to the boundary value.
Method and systems for obtaining direct feedback from a payment card by using energy received from a radio frequency identification (RFID) card reader is provided. The method is implemented by a processor that is embedded in the payment card. The method includes: receiving, from the RFID card reader, a radio frequency (RF) signal that relates to a proposed transaction; transmitting, to the RFID card reader, account information that relates to the proposed transaction; and causing an actuator that is embedded in the payment card to actuate a feedback action based on the RF signal. The actuator may include a haptic device that generates a vibration that is detectable by a touch of a user of the payment card.
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
In some aspects, the techniques described herein relate to a method including: determining an optimal code block from a plurality of code blocks, wherein the plurality of code blocks each solve a predetermined problem, and wherein the optimal code block optimizes a coding efficiency; pairing the optimal code block with suboptimal code blocks from the plurality of code blocks, wherein the pairing generates suboptimal-to-optimal code pairs; training a machine learning model with the suboptimal-to-optimal code pairs, wherein the training fine-tunes the machine learning model for inferring edits to input code blocks, and wherein the edits to the input code blocks optimize the input code blocks in terms of the coding efficiency; receiving, at the machine learning model, an input code block; inferring, by the machine learning model, edits to the input code block; and outputting, by the machine learning model, an optimized code block based on the input code block.
Systems and methods for quantum-safe key infrastructures are disclosed. A method may include: (1) generating, by a first symmetric key device at a first location with a second symmetric key device at a second location, and over a symmetric key distribution channel, a symmetric key; (2) receiving, by a first encryptor at the first location, data from a first server or application; (3) encrypting, by the first encryptor, the data using the symmetric key; (4) communicating, by the first encryptor, the encrypted data to a second encryptor at the second location over a quantum-safe communication channel; (5) receiving, by the second encryptor, the symmetric key from the second symmetric key device; (6) decrypting, by the second encryptor, the encrypted data with the symmetric key; and (7) providing, by the second encryptor, the data to a second server or application.
Automated evaluation and improvement of code quality is disclosed. A method may include: receiving code to optimize; evaluating the code for a plurality of code quality dimensions using a LLM, wherein the LLM returns a code quality score and a qualitative summary for each code quality dimension; generating an overall code quality score based on the code quality score and the qualitative summary; improving the code using the LLM based on the code quality score and the qualitative summary for each code quality dimension; evaluating the improved code for the plurality of code quality dimensions using the wherein the LLM returns an updated code quality score and an updated qualitative summary; generating an overall code quality score based on the updated code quality score and the updated qualitative summary; and outputting the improved code in response to the updated code quality score being higher than the overall code quality score.
A system is provided for implementing a document image transformation tool that transforms an image of at least one physical document into digestible data. The system stores instructions that cause a processor to: generate a first template definition of a first type of document; transform, based on the template definition, the image of the at least one physical document into a transformed image of the at least one physical document; produce, based on the template definition, input data from the transformed image of the at least one physical document; compute, based on the transforming and the producing, analytics that identify at least one parameter of a result of the transforming and the producing; associate, via an association, the input data with the analytics; and digest at least one from among the input data, the analytics, and the association.
G06T 7/33 - Détermination des paramètres de transformation pour l'alignement des images, c.-à-d. recalage des images utilisant des procédés basés sur les caractéristiques
A method for automating roadmap software content creation is provided. The method may include gathering data, by at least one processor, from one or more data sources; filtering, by the at least one processor, the data based on a predetermined criteria to identify one or more requests to update a software application being unsupported by an external cloud environment; and creating content automatically for a roadmap software tool, based on the one or more requests, by using a content generating workflow software tool.
A method and a system for automating a process of generating a recipe for software code maintenance by recommending sub-recipes that are needed to write a new recipe are provided. The method includes: receiving a first user input that includes information that relates to the new recipe, such as a recipe name and a recipe description; analyzing the information that relates to the new recipe in order to automatically determine a list of sub-recipes for possible inclusion in the new recipe and a corresponding set of scores that indicate a probability that each sub-recipe is suitable for inclusion in the new recipe; transmitting, to the user, the list and a request for user feedback; and receiving a second user input that includes a set of selected sub-recipes to be included in the new recipe.
A method and system for tracing data streamed across differing different system platforms are disclosed. The method includes providing and storing context data corresponding to a data event published to a streaming service, extracting a data classifier block from the stored context data, and extracting a lineage tracer block from the stored context data. The method further includes converting the lineage tracer block into a linked lineage triple, and generating a lineage graph using the linked lineage triple for visualization.
Systems and methods for proactively monitoring the inherent cyber-tech risk of software and hardware components are disclosed. In one embodiment, a method for proactively monitoring a cyber risk of a computer program may include: (1) receiving, by a product/version risk assessment computer program executed by an electronic device and from a user computer program executed by a use electronic device, an identification of a plurality of proposed components to include in the computer program; (2) retrieving, by the product/version risk assessment computer program, vulnerability information for each of the plurality of proposed components, wherein the vulnerability information identifies a security vulnerability for the proposed component; (3) generating, by a product/version risk scoring computer program, a risk score for the computer program under development based on the vulnerability information; and (4) returning, by the vulnerability assessment computer program, the risk score to the user computer program.
Systems and methods for check image deposit are disclosed. In one embodiment, a method for bulk check image deposit may include: (1) capturing, by a computer application executed by an electronic device, a plurality of check images for a plurality of checks comprising an image of a first side of each check and an image of a second side of each check; (2) submitting, by the computer application, the plurality of check images to a backend in a deposit transaction; (3) matching, by a check recognition computer program at the backend, the images of the first side of the checks with the images of the second sides of the checks; (4) validating, by a deposit service computer program executed by the backend, the matched images for each of the checks; and (5) depositing, by the deposit service computer program, the validated checks.
36 - Services financiers, assurances et affaires immobilières
Produits et services
Providing trading, exchange, transfer, and payment services for digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Issuance of digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Payment processing services in the field of digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Electronic funds transfer services; Electronic funds transfer, namely, electronic transmission of digital currency via electronic communications networks and electronic devices; Electronic transmission of data, namely, digital currency via electronic communication networks and electronic devices; Digital currency trading and exchange services; Currency trading, exchange, and transfer services via distributed ledger technology; Issuance and redemption of digital currency for currency; Electronic financial trading services; Digital asset trading services; Financial securities exchange services; Securities debt settlement services using distributed ledger technology; Securities brokerage services using distributed ledger technology; Financial exchange of digital assets; On-line real-time currency trading; On-line real-time digital token trading; Electronic payment processing services via distributed ledger technology; Financial services, namely, providing electronic transfer of a digital assets for use by members of an online community via a global computer network; Payment and funds verification services; Financial transaction processing services, namely, clearing and reconciling financial transactions via computer and communication networks; Providing an internet website featuring information in the fields of finance, financial transactions, digital financial assets, and currency exchange services; Financial exchange services, namely, providing a financial exchange for trading currency, digital currency, payment tokens, and digital tokens; Financial exchange services, namely, a financial futures exchange for trading currency including digital currency; Financial services, namely, facilitating the deposit, holding, and withdrawal of electronic funds; Clearing and reconciling financial transactions; Financial transactions services, namely, electronic transfer and exchange of digital assets, digital tokens, payment tokens, and digital currency via blockchain; Financial brokerage services for digital asset trading; Financial management of assets via distributed ledger technology; Financial custody services, namely, maintaining possession of financial assets for others for financial management purposes; Financial services, namely, debt settlement; Financial services, namely, providing on-line stored value accounts in an electronic environment; Financial transaction services, namely, providing secure commercial transactions and payment options; Financial investment services, namely, brokerage services on securities exchanges and over-the-counter markets using distributed ledger technology; Providing financial information, namely, account data sharing, payment information sharing, check information sharing, account validation information, currency conversion information, cross-border payment information, fraud data, fraud identification information, federated learning information, and federated intelligence information all via distributed ledger technology; Banking and financial services
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable computer software for use in analyzing the performance of fixed income securities portfolios and for providing information about fixed income securities portfolios Non-downloadable software for use in analyzing the performance of fixed income securities portfolios and for providing information about fixed income securities portfolios
09 - Appareils et instruments scientifiques et électriques
Produits et services
Downloadable software; downloadable financial software; downloadable software, namely virtual currency, digital currency, digital tokens of value, and cryptocurrency; computer programs relating to financial matters; computer software platforms for financial and currency exchange; computer application software for blockchain based platforms; computer software for use in connection with digital currency and cryptocurrency; computer software and computer hardware for use as a cryptocurrency wallet; Downloadable computer software for managing cryptocurrency transactions using blockchain technology; Downloadable computer software for the handling of financial transactions; Downloadable computer programs for managing, verifying, initiating, receiving, and holding transactions and digital assets in financial matters; Downloadable financial exchange software; Downloadable currency exchange software; Downloadable currency trading software; Downloadable software for financial trading; Downloadable computer software for managing, initiating, receiving, and holding digital currency; Downloadable software for managing, initiating, receiving, and holding cryptocurrency; Downloadable software for the purchase, sale, trade, payment, clearing, and deposit of tokens of value.
63.
SYSTEMS AND METHODS FOR PAYMENT TOKEN PROVISIONING WITH VARIABLE RISK EVALUATION
Systems and methods for payment token provisioning with variable risk evaluation are disclosed. In one embodiment, a method may include: an issuer backend: (1) receiving, from an electronic wallet application, a payload comprising an identification of a card to be provisioned to the mobile electronic device; (2) determining that the card is eligible for provisioning to the mobile electronic device; (3) generating a card payload and communicating the card payload to the payment network, wherein the payment network creates a payment token for the card comprising payment token origin information; (4) receiving the payment token from the payment network and generating a risk profile for the payment token; and (5) activating the payment token in response to the validation.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p. ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
36 - Services financiers, assurances et affaires immobilières
Produits et services
(1) Providing trading, exchange, transfer, and payment services for digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Issuance of digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Payment processing services in the field of digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Electronic funds transfer services; Electronic funds transfer, namely, electronic transmission of digital currency via electronic communications networks and electronic devices; Electronic transmission of data, namely, digital currency via electronic communication networks and electronic devices; Digital currency trading and exchange services; Currency trading, exchange, and transfer services via distributed ledger technology; Issuance and redemption of digital currency for currency; Electronic financial trading services; Digital asset trading services; Financial securities exchange services; Securities debt settlement services using distributed ledger technology; Securities brokerage services using distributed ledger technology; Financial exchange of digital assets; On-line real-time currency trading; On-line real-time digital token trading; Electronic payment processing services via distributed ledger technology; Financial services, namely, providing electronic transfer of a digital assets for use by members of an online community via a global computer network; Payment and funds verification services; Financial transaction processing services, namely, clearing and reconciling financial transactions via computer and communication networks; Providing an internet website featuring information in the fields of finance, financial transactions, digital financial assets, and currency exchange services; Financial exchange services, namely, providing a financial exchange for trading currency, digital currency, payment tokens, and digital tokens; Financial exchange services, namely, a financial futures exchange for trading currency including digital currency; Financial services, namely, facilitating the deposit, holding, and withdrawal of electronic funds; Clearing and reconciling financial transactions; Financial transactions services, namely, electronic transfer and exchange of digital assets, digital tokens, payment tokens, and digital currency via blockchain; Financial brokerage services for digital asset trading; Financial management of assets via distributed ledger technology; Financial custody services, namely, maintaining possession of financial assets for others for financial management purposes; Financial services, namely, debt settlement; Financial services, namely, providing on-line stored value accounts in an electronic environment; Financial transaction services, namely, providing secure commercial transactions and payment options; Financial investment services, namely, brokerage services on securities exchanges and over-the-counter markets using distributed ledger technology; Providing financial information, namely, account data sharing, payment information sharing, check information sharing, account validation information, currency conversion information, cross-border payment information, fraud data, fraud identification information, federated learning information, and federated intelligence information all via distributed ledger technology; Banking and financial services.
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Financial affairs and monetary affairs, namely, financial information, management and analysis services; Financial advisory services rendered using artificial intelligence (AI); information, advisory, consultancy and financial research services relating to finance and investments; investment advisory services; financial analysis and consultation; investment consultation in the fields of securities investing and asset management; providing financial services with respect to securities and other financial instruments and products, namely, trading of and investments in securities and financial instruments and products for others; financial information provided by electronic means; providing information and research in the field of finance and financial investments; Financial data analysis; Financial analysis, namely, compiling and analyzing statistics, data and other sources of information for financial purposes. Providing on-line non-downloadable software using artificial intelligence (AI) for use in asset management; Providing temporary use of online non-downloadable chatbot software using artificial intelligence (AI) for investment portfolio management; Providing temporary use of online, non-downloadable cloud computing software using artificial intelligence (AI) for use in selecting financial securities and financial assets; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for investment insights, portfolio management, and trading; Artificial intelligence as a service (AIAAS) featuring software using artificial intelligence (AI) for analyzing data and interacting with humans; Platform as a service (PAAS) services featuring computer software platforms use of artificial intelligence for natural language processing using generative pre-trained transformer (GPT) models in the field of financial services; Platform as a service (PAAS) featuring computer software platforms for analyzing and selecting securities tailored to customer; Platform as a service (PAAS) featuring computer software platforms for use in financial and monetary affairs; Platform as a service (PAAS) featuring computer software platforms for use in financial information, advisory, analysis, consultancy, research, and management; Platform as a service (PAAS) featuring computer software platforms for asset and portfolio management; Platform as a service (PAAS) featuring computer software platforms for investment and securities trading; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for financial and monetary affairs; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for use in financial information, advisory, analysis, consultancy, research, and management; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for asset and portfolio management.
66.
APPARATUSES AND METHODS FOR FACILITATING A TRANSCRIPT SUMMARIZATION WITH SPELLING CORRECTIONS
Aspects of the subject disclosure may include, for example, obtaining a model, obtaining input audio, processing the input audio to generate a transcript, obtaining at least one summary based on the transcript, identifying at least one error or inconsistency in the transcript or the at least one summary based on the model, and implementing, based on the identifying, a correction or a clarification in respect of the at least one error or inconsistency. Other aspects are disclosed.
G10L 15/01 - Estimation ou évaluation des systèmes de reconnaissance de la parole
G10L 15/06 - Création de gabarits de référenceEntraînement des systèmes de reconnaissance de la parole, p. ex. adaptation aux caractéristiques de la voix du locuteur
67.
SYSTEMS AND METHODS FOR PREDICTING RECOMMENDATIONS USING GRAPH RELATIONSHIPS
Systems and methods for predicting recommendations using graph relationships are disclosed. According to an embodiment, a method may include: (1) monitoring, by a computer program, a messaging interface for transactions; (2) updating, by the computer program, a heterogeneous graph with data from the transactions, wherein the heterogeneous graph identifies a plurality of assets and a plurality of clients; (3) training, by the computer program, a graph model with the heterogeneous graph; (4) querying, by the computer program, the graph model with one of the plurality of assets, wherein the graph model returns a recommendation that identifies a subset of the plurality of clients for the asset; and (5) outputting, by the computer program, the recommendation.
Systems and methods for state machine driven programmable payments are disclosed. A method may include: defining a plurality of base state machines; storing definitions for the plurality of base state machines; receiving, via a user interface, a programmable payment instruction (“PPI”) from a user comprising a PPI definition of a PPI trigger, a PPI condition, and a PPI action; dynamically linking a state in one of the plurality of base state machines to the PPI definition; storing the PPI definitions; receiving a payment instruction; identifying, from the payment instruction, a base state machine and the PPI instruction linked to the payment instruction; creating a PPI-specific state machine definition for the PPI instruction linked to the payment instruction; and instantiating a PPI-specific state machine for the PPI-specific state machine definitions. The PPI-specific state machine calls one of the plurality of base state machines to execute portions of the payment instruction.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
Interactive point of transaction devices are disclosed. A method may include: (1) detecting, by a computer program executed by an interactive point of transaction device, a biometric or a transaction device proximate to the interactive point of transaction device; (2) providing, by the computer program and on the interactive point of transaction device, instructions for presenting the biometric or the transaction device to a target sensor on the interactive point of transaction device; (3) providing, by the computer program, feedback on the presentation of the biometric or the transaction device to the target sensor on a display; (4) capturing, by the computer program and using the target sensor, information from the biometric or the transaction device; and (5) providing, by the computer program, instructions for removing the biometric or the transaction device from the interactive point of transaction device.
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
G06V 40/60 - Moyens statiques ou dynamiques permettant d’aider l’utilisateur à positionner une partie du corps pour l’acquisition de données biométriques
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Financial affairs and monetary affairs, namely, financial information, management and analysis services; Financial advisory services rendered using artificial intelligence (AI); Information, advisory, consultancy and financial research services relating to finance and investments; Investment advisory services; Financial analysis and consultation; Investment consultation in the fields of securities investing and asset management; Providing financial services with respect to securities and other financial instruments and products, namely, trading of and investments in securities and financial instruments and products for others; Financial information provided by electronic means; Providing information and research in the field of finance and financial investments; Financial data analysis; Financial analysis, namely, compiling and analyzing statistics, data and other sources of information for financial purposes Providing on-line non-downloadable software using artificial intelligence (AI) for use in asset management; Providing temporary use of online non-downloadable chatbot software using artificial intelligence (AI) for investment portfolio management; Providing temporary use of on-line non-downloadable cloud computing software using artificial intelligence (AI) for use in selecting financial securities and financial assets; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for investment insights, portfolio management, and trading; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for analyzing data and interacting with humans; Platform as a service (PAAS) featuring computer software platforms for use of artificial intelligence for natural language processing using generative pre-trained transformer (GPT) models in the field of financial services; Platform as a service (PAAS) featuring computer software platforms for analyzing and selecting securities tailored to customer; Platform as a service (PAAS) featuring computer software platforms for use in financial and monetary affairs; Platform as a service (PAAS) featuring computer software platforms for financial information, advisory, analysis, consultancy, research, and management; Platform as a service (PAAS) featuring computer software platforms for for asset and portfolio management; Platform as a service (PAAS) featuring computer software platforms for investment and securities trading; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for financial and monetary affairs; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for use in financial information, advisory, analysis, consultancy, research, and management; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for asset and portfolio management
71.
METHOD AND SYSTEM FOR VIRTUALLY TETHERING A PHYSICAL PRODUCT TO AN AUTHENTICATED PHYSICAL RECORD
A system for implementing a tool that virtually tethers a product to an authenticated physical record of the product. The system comprises a processor and memory that stores instructions that, when executed by a processor, cause the processor to perform operations. The operations may comprise: receiving a set of images of a first product; processing the set of images to determine a first set of attributes of the first product; determining whether the authenticated physical record comprises a description of the first set of attributes; and when a determination is made that the authenticated physical record comprises the description of the first set of attributes, utilizing the tool to virtually tether the first product to the authenticated physical record.
Systems and methods for eligibility-based interchange models are disclosed. According to an embodiment, a method for creating an eligibility-based interchange model may include: (1) ingesting, by an eligibility model computer program, interchange data from one or more sources source of interchange data; (2) generating, by the eligibility model computer program, an eligibility-based model using the ingested interchange data; (3) making available, by the eligibility model computer program, the eligibility-based model to a plurality of downstream systems; and (4) monitoring, by the eligibility model computer program, the one or more sources source of interchange data for updates to the interchange data.
A method and a system for dynamic request for quotation (RFQ) pricing using reinforcement learning and symbolic regression in order to obtain a pseudo-optimal nonlinear state-feedback controller for tracking a metric with increased interpretability are provided. The method includes: receiving bid price information and ask price information that relates to a financial instrument; selecting a metric to be used in conjunction with a determination of an RFQ price with respect to the financial instrument; formulating a Markov Decision Process (MDP) that relates to the determination of the RFQ price; using the MDP to define an RFQ pricing controller with respect to the metric; applying a reinforcement learning algorithm in order to tune a behavior of the RFQ pricing controller with respect to the metric; and using the RFQ pricing controller, the first information, and the second information to determine the RFQ price.
Methods and systems for generating, publishing, processing, and consuming linked data events and streams being shared by complex systems in order to construct a semantic web of the data and thereby form a consolidated coherent view of the data are provided. A method includes: receiving a set of metadata that relates to a set of events; generating, based on the metadata, an ordered node hierarchy map and a modern data event schema; receiving a set of tabular data; generating, based on the tabular data and the ordered node hierarchy map, the set of events; streaming the set of events over a streaming pipeline; processing the streamed set of events to generate a linked data media format; and outputting the linked data media format.
A method and a system for automatically performing specialized due diligence for politically exposed persons in order to evaluate risk levels associated therewith are provided. The method includes: receiving a first data set that includes a name of a person and a list of positions associated with the person; extracting, from the first data set, first additional information that relates to the person; identifying, for each respective position included in the list of positions, a corresponding category from among a set of positional categories; retrieving, from at least one publicly accessible information source, second additional information that relates to the person; analyzing each of the first data set, the first additional information, and the second additional information in order to obtain answers to questions from among a predefined set of questions; and generating a due diligence report based on a result of the analysis.
In some aspects, the techniques described herein relate to a method including: receiving ambiguous data at an interface of a matching platform; persisting the ambiguous data to a receiving data store of a matching platform; providing the ambiguous data as input to a matching engine; matching, by the matching engine, the ambiguous data to data in a production data store; retrieving, by the matching engine, a source identifier associated with the data in the production data store; and providing the source identifier to a user device in operative communication with the matching platform.
Systems, methods, and devices for payment product verification and authorization using a customer identifier are disclosed. In some aspects, techniques described herein relate to receiving, by a payment product provider and from a payment processor, a customer identifier; querying a datastore of customers of the payment product provider with a parameterized query, where the customer identifier is a parameter of the query; determining, based on the query, that the customer identifier is associated with customer profile data of the payment product provider; determining payment product data associated with the customer profile data; returning, by the payment product provider and to the payment processor, a positive eligibility indication based on the customer profile data and the payment product data; receiving, by the payment product provider and from the payment processor, a customer approval indication; and sending, by the payment product provider and to the payment processor, the payment product data.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 30/0201 - Modélisation du marchéAnalyse du marchéCollecte de données du marché
G06Q 30/0207 - Remises ou incitations, p. ex. coupons ou rabais
78.
METHOD AND SYSTEM FOR DYNAMIC REQUEST FOR QUOTATION PRICING USING PROPORTIONAL-INTEGRAL-DERIVATIVE CONTROL WITH BAYESIAN OPTIMIZATION
A method and a system for dynamic request for quotation (RFQ) pricing using proportional-integral-derivative (PID) control with Bayesian optimization in order to determine an optimal linear state-feedback controller for tracking a metric are provided. The method includes: receiving bid price information and ask price information that relates to a financial instrument; selecting a metric to be used in conjunction with a determination of an RFQ price with respect to the financial instrument; estimating an output of a PID controller based on a predetermined function of the metric; adjusting the estimate by using a Bayesian optimization process; and using the PID controller, the adjusted estimate, the bid price information, and the ask price information to determine the RFQ price.
Aspects of the subject disclosure may include, for example, obtaining a user query to access information from a group of knowledge graph databases, the user query corresponding to user-generated input, and identifying a group of terms within the user query that reduces a likelihood of identifying a match within the group of knowledge graph databases. Further embodiments can include adjusting the user query resulting in a first adjusted user query that enables identifying a knowledge graph database from the group of knowledge graph databases, identifying the knowledge graph database from the group of knowledge graph databases based on the first adjusted user query, and generating a first database query based on the first adjusted user query and the knowledge graph database, in which the first database query would have a computer-readable syntax compatible with the identified knowledge graph database. Other embodiments are disclosed.
In some aspects, the techniques described herein relate to a method including: receiving, at a data management platform, incoming data; writing the incoming data to a primary database cluster; executing an incremental backup operation, wherein the incremental backup operation generates an incremental backup of the primary database cluster; storing the incremental backup of the primary database cluster in a storage location; after a predetermined amount of time, executing an incremental restore operation on a delayed database cluster, wherein the incremental restore operation restores the incremental backup of the primary database cluster to the delayed database cluster; determining a data anomaly in the incoming data; and executing a failover command, wherein the failover command redirects database queries from the primary database cluster to the delayed database cluster.
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
81.
METHOD AND SYSTEM FOR ARTIFICIAL INTELLIGENCE ASSISTED CONTENT LIFECYCLE MANAGEMENT
A method for facilitating content lifecycle management via artificial intelligence for AI assisted authoring, AI assisted editing, and phased AI on AI recursive authoring and editing is disclosed. The method includes receiving, via an application programming interface, inquiries in a natural language format, each of the inquiries including freeform data; vectorizing the inquiries to generate numeric sequences; identifying, by using a model, topics for each of the inquiries based on the corresponding numeric sequences, each of the topics including a subject matter value and a sentiment value; aggregating information that corresponds to the topics from various sources, the sources including a preconfigured data lake; determining, by using the model, solutions in the natural language format for each of the inquiries based on the aggregated information, the solutions including recommended actions based on a predetermined setting; and generating, by using the model, a response that includes the solutions.
G06F 40/40 - Traitement ou traduction du langage naturel
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p. ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G06F 40/253 - Analyse grammaticaleCorrigé du style
Aspects of the subject disclosure may include, for example, receiving user inputs, including a portfolio market value, a portfolio growth rate, an SAA percentage, an allocation percentage for asset class(es), a number of future equal periodic capital commitments, and/or a timeframe for achieving the SAA percentage, obtaining projections for the asset class(es) based on an aggregated dataset relating to the asset class(es) and information regarding existing capital commitments in the asset class(es), determining values based on the user inputs and the projections, wherein the values include a proposed amount of each future equal periodic capital commitment, a projected timeframe for reaching the SAA percentage, proposed amounts of varying future capital commitments for individual periods in the timeframe, and/or a rate of change relating to the proposed amounts of varying future capital commitments, and deriving and presenting a portfolio plan using the values. Other embodiments are disclosed.
In some aspects, the techniques described herein relate to a method including: receiving, at a query platform, a query and a document identifier; determining, based on the document identifier, a document-type parameter; generating, based on metadata related to the document-type parameter, an optimized query; generating a query vector embedding from the optimized query; executing a lexical search on a document pool, wherein the lexical search is based on the optimized query, and wherein the lexical search returns a first document set; executing a contextual search on a vector database, wherein the contextual search is based on the query vector embedding and returns a second document set; and generating a targeted document set from the first document set and the second document set.
Systems and methods for providing firewalls and authenticators for smart terminals are disclosed. In one embodiment, a method may include: (1) receiving, by a smart terminal and from a browser, a browsing request to access a Uniform Resource Locator (URL) or an address for externally hosted content, wherein the smart terminal is prevented from directly accessing the URL or the address; (2) routing, by the smart terminal, the browsing request to a secure server; (3) checking, by the secure server, the URL or the address against an allowed list or a prohibited list; (4) directing, by the secure server, the browser to the URL or the address in response to the URL or the address being on the allowed list, or the URL or the address not being on the prohibited list; and (5) providing, by the secure server, a secure connection between the browser and the URL or the address.
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Banking and financial services; corporate responsibility initiatives in the field of philanthropy, namely, charitable services in the nature of providing grants that help to support small businesses and providing educational and skills training grants; providing a website featuring information in the field of banking and financial services. Providing a website featuring technology in the nature of an online portal that enables users to manage financial accounts, to access financial transaction histories and account information, to manage monetary payments and transfers, and to access fraud monitoring services; Software as a service (SAAS) services featuring software for managing financial investment portfolios; software as a service, offered via a website, for use in providing banking and financial services, namely, retail banking services, including digital wallet and electronic payment services, credit card services, investment services and lending services; software as a service, offered via a website, used by customers to facilitate account transactions, manage accounts and to obtain related financial information and advice; Temporary use of on-line non-downloadable computer software for use in providing financial services, namely, providing risk management, financial information, financial management, securities trading and investment management services; Platform as a service (PAAS) featuring computer software platforms for use in global payments; platform as a service (PAAS) featuring software platforms enabling customers to send and receive electronic payments; development of personalized and customizable payment platforms in multi currencies and languages, in the nature of online non-downloadable software for others.
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Banking and financial services; corporate responsibility initiatives in the field of philanthropy, namely, charitable services in the nature of providing grants that help to support small businesses and providing educational and skills training grants; providing a website featuring information in the field of banking and financial services
(2) Providing a website featuring technology in the nature of an online portal that enables users to manage financial accounts, to access financial transaction histories and account information, to manage monetary payments and transfers, and to access fraud monitoring services; Software as a service (SAAS) services featuring software for managing financial investment portfolios; software as a service, offered via a website, for use in providing banking and financial services, namely, retail banking services, including digital wallet and electronic payment services, credit card services, investment services and lending services; software as a service, offered via a website, used by customers to facilitate account transactions, manage accounts and to obtain related financial information and advice; Temporary use of on-line non-downloadable computer software for use in providing financial services, namely, providing risk management, financial information, financial management, securities trading and investment management services; Platform as a service (PAAS) featuring computer software platforms for use in global payments; platform as a service (PAAS) featuring software platforms enabling customers to send and receive electronic payments; development of personalized and customizable payment platforms in multi currencies and languages, in the nature of online non-downloadable software for others
A method may include: (1) receiving reference data comprising input texts and corresponding labels; (2) training a covariate drift detector comprising a syntactic drift detector and a semantic draft detector with the reference data; (3) training a concept drift detector comprising a plurality of classifiers with the reference data; (4) receiving production data comprising a plurality of instances; (5) determining that the production data has drifted; (6) calculating similarity scores between each instance of the production data and the reference data; (7) detecting concept drift by generating a predictive distribution using the plurality of classifiers and calculating an entropy of the predictive distribution; (8) identifying final drifted instances from the covariate drifted instances and the concept drifted instances; and (9) receiving updated labels for the final drifted instances.
In some aspects, the techniques described herein relate to a method including: executing a first query, at a predefined time interval, against a target datastore for insight records related to an entity identifier; storing results of the first query as a record set, wherein the record set includes one or more existing insight records, and wherein each existing insight record includes connection information for connecting to a corresponding insight datastore; executing insight retrieval logic for each insight record in the record set, wherein the insight retrieval logic executes a second query against the corresponding insight datastore and retrieves a new insight value from the corresponding insight datastore; persisting the new insight value in a new insight record in the target datastore; and sending the new insight record as a communication to a recipient.
A method and a system for dynamic management of allocation of extensions that correspond to directory numbers for a smooth, efficient user experience and operational savings to the allocator is provided. The method includes: receiving, from a user via a user interface such as a telephone terminal, a connect request for an assignment of an extension; analyzing the connect request to determine characteristic traits associated with the user, such as a switch and a physical location; determining a set of available extensions that are assignable to the first user based on the characteristic traits; and assigning, to the user, an extension from within the set of available extensions that has not previously been assigned and that has been prechecked for validity and correct configuration. Upon assignment, the assigned extension is propagated to a ribbon of the user for subsequent usage without needing to reenter the number.
H04M 3/493 - Services d'information interactifs, p. ex. renseignements sur l'annuaire téléphonique
H04M 3/523 - Dispositions centralisées de réponse aux appels demandant l'intervention d'un opérateur avec répartition ou mise en file d'attente des appels
Systems and methods for approximation of Shapley values in memory-constrained environments are disclosed. According to an embodiment, a method may include: (1) receiving, by a training computer program executed on a training electronic device, a training dataset; (2) training, by the training computer program, a machine learning model on the training dataset; (3) deploying, by the training computer program, the machine learning model to a deployment electronic device; (4) receiving, by the deployment electronic device, an incoming data query; (5) generating, using the machine learning model, a prediction for the incoming data query; and (6) estimating, by a model explanation computer program, a Shapley value for the prediction.
Systems and methods for construction and retraining of decision trees ensemble using hybrid classical-quantum algorithms are disclosed. A method may include a classical computer program: receiving a dataset; calculating feature-weights for original examples using a feature-weight calculation method; updating the feature-weights for the original examples with feature-weights for the original examples and the new examples; loading the feature-weights for the dataset and new data into a first quantum-accessible data structure and loading overwritten values into a second quantum-accessible data structure; instructing a quantum computer to query quantum states for the first and second quantum-accessible data structures using random sampling with replacement, to execute quantum-supervised clustering with the quantum states and the feature-weights, to grow a depth for the tree, and to calculate labels for a regression task and/or a classification task; and receiving the labels from the quantum computer.
Aspects of the subject disclosure may include, for example, validating data across database tables by comparing checksums across rows of the various tables. A client computing device may perform a database query to produce checksum values for one or more rows in one or more database tables to be compared. Checksums are compared and when mismatches are found, database table rows may be copied from one database table to another, or entire database tables may be copied. Other embodiments are disclosed.
Systems and methods for digital identity and account abstraction are disclosed. A method may include: creating, by an application executed by a user electronic device in an off-chain environment, a user operation for a transaction based on an intention received from a user; receiving, by an entry point contract in an on-chain environment, the user operation with a verifiable credential for the user; validating, by the entry point contract, the user operation using a validation function in a smart contract wallet; determining, by the entry point contract, that there is a paymaster to sponsor the transaction; determining, by a paymaster contract for the paymaster, that the transaction should be sponsored based on the verifiable credential for the user; executing, by the entry point contract, the transaction using an arbitrary execution function in the smart contract wallet; and invoking, by the entry point contract, a post-operation that performs post-operation logic.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
97.
SYSTEMS AND METHODS FOR ENHANCED MOBILE DEVICE AUTHENTICATION
Systems and methods for enhanced mobile device authentication are disclosed. Systems and methods for enhanced mobile authentication are disclosed. In one embodiment, method for electronic device authentication may include (1) a server comprising at least one computer processor communicating a one-time passcode to an electronic device over a first communication channel; (2) the server receiving, from the electronic device over a second communication channel the one-time passcode encrypted with a private key associated with the electronic device; (3) the server decrypting the one-time passcode using a public key; (4) the server validating the one-time passcode; (5) the server generating a device identifier for the electronic device; and (6) the server persisting an association between the device identifier and the electronic device.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
H04L 9/14 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
H04L 9/30 - Clé publique, c.-à-d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
98.
SYSTEM AND METHOD FOR GENERATING BUDGETARY RECOMMENDATIONS FOR A USER-SELECTED TARGET ACTIVITY
A system and method for generating a budgetary recommendation for a user-selected target activity are disclosed. The method includes enabling a user to select a target activity from a plurality of activities. Next, the method includes receiving first information associated with a set of preferences that corresponds to the selected target activity. Next, the method includes retrieving second information associated with the selected target activity and the first information. Next, the method includes analyzing, using a recommendation engine, the first information and the second information to determine a budgetary allocation. Next, the method includes generating a preliminary budgetary recommendation based on the determined budgetary allocation. Next, the method includes rendering, via a display, the preliminary budgetary recommendation to receive a user input. Next, the method includes generating a final budgetary recommendation based on the user input received in response to the preliminary budgetary recommendation.
A method may include: receiving a dataset comprising a plurality of label names and a label description for each label name; prompting a large language model (LLM) for initial annotation guidelines with the dataset; receiving, from the LLM, the initial annotation guidelines; receiving an unlabeled dataset comprising unlabeled text samples; predicting a label name for each unlabeled text sample; presenting each unlabeled text sample and its predicted label name for review; grouping incorrectly labeled text samples and their predicted label names; prompting the LLM for a recommendation to improve the initial annotation guidelines with the group of the incorrectly labeled text samples and their predicted label names and the initial annotation guidelines; receiving, from the LLM, the recommendation; prompting the LLM for improved annotation guidelines with the initial annotation guidelines and the recommendation; receiving the improved annotation guidelines; and deploying the improved annotation guidelines to a production environment.
G06F 40/169 - Annotation, p. ex. données de commentaires ou notes de bas de page
G06F 16/383 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
100.
SYSTEM AND METHOD FOR REAL-TIME SPOT PRICE VOLATILITY SURFACE PREDICTION
Various methods and processes, apparatuses/systems, and media for data processing are disclosed. A processor accesses a database that stores a plurality of historical data and input data corresponding to a derivative instrument; implements an artificial intelligence deep learning model; trains the artificial intelligence deep learning model with the historical data and the input data corresponding to the derivative instrument for time-series data prediction; learns, in response to training, volatility surface deformation data over time corresponding to the derivative instrument; calculates spot sensitivity data of the derivative instrument based on the volatility surface deformation data output from the artificial intelligence deep learning model; displays the spot sensitivity data onto a user interface; and receives user input via the user interface to conduct a transaction with respect to the derivative instrument.