A system can generate a risk indicator associated with a target entity. For example, the system can receive a request for a risk indicator associated with a target entity. For each data source in a set of data sources, the system can: retrieve identity data associated with the target entity based on the identity of the target entity; and generate a set of element risk scores and a set of affiliation scores associated with each element of the set of elements. The system can determine an aggregate element risk score and an aggregate element affiliation score. The system can determine the risk indicator by combining the aggregated element risk scores of the set of elements based on a first set of element weights. The system can transmit, to a remote computing device, a responsive message including at least the risk indicator.
A system can generate a trust indicator associated with a target entity. For each data source, the system can: retrieve identity data associated with the target entity based on the identity of the target entity; generate a set of element risk scores and a set of affiliation scores associated with each element of the set of elements. The system can determine an aggregate element risk score and an aggregate element affiliation score. The system can determine a risk score by combining the aggregated element risk scores based on a first set of element weights and an affiliation score by combining the aggregated element affiliation scores based on a second set of weights. The system can transmit a responsive message including at least the trust indicator in which the trust indicator is based on the risk score and the affiliation score.
In some aspects, a verification system can receive a verification query from a verifier computing system for requesting verification of characteristics of an entity involved in an online interaction. The verification query can include a unique identifier (“UID”) of the entity. The verification computing system can query a verification repository in the verification computing system based on the UID. Additionally, the verification computing system can query an external-source cache using the UID. In response to determine a match for the UID in the external-source cache, the verification computing system can request external sensitive data records for the entity from an external source corresponding to the external-source cache. Generating consolidated sensitive data records can involve consolidating the external sensitive data records and internal sensitive data records obtained through querying the verification repository. A verification result, generated using the consolidated sensitive data records, can be transmitted to the verifier computing system.
In some aspects, a compliance computing system can generate an evidence repository including evidence data received via an application programming interface (API) from one or more external systems. The system can generate an evidence repository including evidence data received via an application programming interface (API) from one or more systems. The system can receive a compliance request including a compliance query, the compliance query including a requirement identifier associated with a target requirement. The system can also query the evidence repository based on the requirement identifier to retrieve the evidence data associated with the target requirement. Finally, the system can transmit, via a firewall of the compliance computing system, a response message to an external computing system, wherein the response message includes the retrieved evidence data.
Systems and methods for securely sharing stored personal information using data encryption and biometric authentication techniques are disclosed. In some examples, unique items of personal information of an individual may be obtained and placed in data packets. The data packets may be encrypted and may also be encoded with the identity of the individual. A chain of the encrypted data packets may be created and stored in a data repository. A request from an authorized entity for specific personal information of the individual can be received by the system, and may include consent to the request by the individual, and a private key that may be encoded with the identity of the individual. The system can validate the request, and can thereafter decrypt the encrypted data packet containing the requested personal information using the private key and provide the requested personal information to the entity.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité
6.
EXPONENTIALLY SMOOTHED CATEGORICAL ENCODING TO CONTROL ACCESS TO A NETWORK RESOURCE
In an example of a method described herein, historical events occurring over a network are detected, and at least one of the historical events is associated with an observed value of a categorical variable. A numerical aggregate value representing the observed value is updated by applying an exponential smoothing function to (i) a prior numerical aggregate value representing prior historical events associated with the observed value and (ii) a count of the historical events associated with the observed value. An event occurring over the network is detected and is associated with the observed value. Features are extracted from the event, where the features include an encoded feature based on the numerical aggregate value to represent the observed value. A predictive model is applied to the features to determine a score representing likelihood of an outcome. Based on the score, access to a resource of the network is controlled.
A method described herein involves various operations directed toward network security. The operations include receiving a request for a risk indicator of a target entity. The risk indicator can indicate a level of risk associated with the target entity based on whether the target entity is associated with a mobile device emulator. The operations include generating the risk indicator by applying the entity data to an emulator detection model trained on a training dataset comprising a corpus of attribute data and interaction data. Finally, the operations include providing, to a remote computing device, a responsive message comprising at least the risk indicator to control access to an interactive computing environment.
A system can generate a risk assessment associated with a target entity. For example, the system can receive a request for a risk indicator associated with a target entity. The system can determine that a data source contains a name associated with the target entity based on extracted text from the data source. The system can identify a sentence containing the name. The system can further determine a sentiment score for the sentence. The system can generate a classification associated with an event included in the sentence. The system can determine a confidence score that the name in the extracted text is associated with the target entity based on attributes associated with the name in the extracted text. The system can transmit, to a remote computing device, a message including the risk indicator based on the classification or sentiment score.
G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
A system can generate a risk assessment associated with a target entity. For example, the system can receive a request for a risk indicator associated with a target entity. For each data source in a set of data sources, the system can: retrieve identity data associated with the target entity based on the identity of the target entity; and generate a set of element scores associated with each element of the set of elements. The system can determine an aggregate element score by combining the data source-level element scores for the set of data sources. The system can determine the risk indicator by combining the aggregated element scores of the set of elements based on a set of element weights. The system can also transmit, to a remote computing device, a responsive message including at least the risk indicator.
Systems and methods for creating predictor variables from unstructured data for prediction models are provided. A variable creation application receives unstructured data and processing the unstructured data to generate processed data. Based on the processed data, the variable creation application generates an attribute pool that contains multiple predictor variables generated by applying natural language processing (NLP) procedures on the processed data. The variable creation application further executes a prediction model on at least the predictor variables in the attribute pool to generate a prediction result. Based on the prediction result, the variable creation application evaluates the predictive power of each of the predictor variables and retains predictor variables that are predictive as input predictor variables for the prediction model.
Systems and methods for automated path-based recommendation for risk mitigation are provided. An entity assessment server, responsive to a request for a recommendation for modifying a current risk assessment score of an entity to a target risk assessment score, accesses an input attribute vector for the entity and clusters of entities defined by historical attribute vectors. The entity assessment server assigns the input attribute vector to a particular cluster and determines a requirement on movement from a first point to a second point in a multi-dimensional space based on the statistics computed from the particular cluster. The first point corresponds to the current risk assessment score and the second point corresponds to the target risk assessment score. The entity assessment server computes an attribute-change vector so that a path defined by the attribute-change vector complies with the requirement and generates the recommendation from the attribute-change vector.
Systems and methods for secure resource management are provided. A secure resource management system includes a resource record repository, such as a secure database or a blockchain, for storing resource records for resources. The resource records contain information of resource providers, information of resource users having a right to obtain resources, and resource transaction histories. Responsive to a request to verify an authorized user of a resource, the secure resource management system further queries the resource record repository, retrieves the resource record, determines the resource user currently having a right to obtain the resource as the authorized user of the resource, and transmits the verification result in response to the request. The verification result identifies the authorized user of the resource and can be used to grant access to the resource by the authorized user.
In some aspects, a computing system can train a machine learning (ML) model for risk assessment using risk assessment training data generated at least in part by a prediction model. Once trained, the ML model can determine a risk indicator for a target entity that indicates a level of risk associated with the target entity. Training the ML model can involve receiving a request to predict a value of an unknown segment of a transaction record used to train the ML model. The computing system can execute the prediction model to predict the value of the unknown segment prior to training the ML model using the transaction record that includes the predicted value generated by the prediction model. Additionally, the computing system can generate explanatory data for the target entity indicating relationships between changes in the risk indicator and changes in the transaction records associated with the target entity.
A telecommunications network server system provides a digital identifier to a user device. The digital identifier may include identification data corresponding to a user of the user device. In addition, the telecommunications network server system receives, from one or more third-party systems, requests to authenticate the user for an electronic transaction with the respective third-party system. The telecommunications network server system provides a unique electronic transaction code to each third-party system. Responsive to receiving from the user device one of the unique electronic transaction codes, the telecommunications network server system provides, to the respective third-party system, authentication of the user.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A system can generate a risk assessment associated with an identity element used in interactions associated with a user entity. For example, the system can receive historical data related an identity element associated with a user entity, the identity element used in a set of interactions associated with the user entity. The system can generate a binomial distribution of the historical data associated with the identity element. The system can determine, based at least in part on the binomial distribution of the historical data, a risk indicator associated with the identity element. The system can control, based at least in part on the risk indicator associated with the identity element, an interaction involving a target entity and the user entity using the identity element.
A method includes determining, using a trained machine-learning model, a risk indicator for a target entity from predictor variables associated with the target entity. The machine-learning model is trained based on a bi-partite similarity graph comprising a first set of nodes and a second set of nodes, where a first set of edges connects the first set of nodes and represents similarities between the nodes of the first set of nodes, a second set of edges connects the first set of nodes to the second set of nodes and represents relationships between the respective connected nodes, and a third set of edges connects the second set of nodes and represents similarities between the connected nodes of the second set of nodes. The method further includes generating and transmitting a responsive message comprising the risk indicator to control access of the target entity to a computing environment.
A system can be used to provide a responsive message for controlling an interaction dispute. The system can receive tokens from an optical character recognition model. The set of tokens can represent at least evidence data relating to an interaction dispute. The system can determine, using an artificial intelligence model, a first likelihood that represents a similarity between a subset of the tokens and the interaction dispute. The system can determine a second likelihood that traversing to the interaction dispute may result in success. The system can provide the responsive message that can control the interaction dispute based on the first likelihood and the second likelihood. The responsive message can include a response to the interaction dispute.
A system can be used to control reversal of an interaction. The system can receive a request to reverse a previously executed interaction. The request can include data relating to a previously executed interaction that may be associated with a. target entity. The system can generate, using an artificial intelligence model that includes a generative artificial intelligence model, risk signals based on the request and the data. The system can determine, based on the risk signals, a risk indicator that represents a. likelihood that the request may be illegitimate. The system can provide a responsive message to control reversal of the previously executed interaction and based on the risk indicator.
A computing system can generate and train a machine-learning model for risk assessment. The machine-learning model can be trained on semi-labelled graph data that may contain one or more isolated nodes generated from a tabularized data set. The computing system can use graph embeddings to compare pairs of nodes of the graph to determine a similarity between each pair of nodes. The similarity may be used to determine whether to create a synthetic edge between the pair of nodes. An additional hyperparameter may be used to tune the number of generated edges based on a desired graph density. The generated graph data may then be used to train a machine-learning model capable of generating a risk indicator for a target entity. Further, the risk indicators can be utilized to control the access by a target entity to an interactive computing environment for accessing services provided by one or more institutions.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer software application for mobile devices, namely, computer software for monitoring, managing, and identifying changes in and risks to information relating to personal credit, fraud, and identity theft Providing temporary use of non-downloadable software for monitoring, managing, and identifying changes in and risks to information relating to personal credit, fraud, and identity theft
21.
ARTIFICIAL INTELLIGENCE MODEL FOR CONTROLLING INTERACTION DISPUTE
A system can be used to provide a responsive message for controlling an interaction dispute. The system can receive tokens from an optical character recognition model. The set of tokens can represent at least evidence data relating to an interaction dispute. The system can determine, using an artificial intelligence model, a first likelihood that represents a similarity between a subset of the tokens and the interaction dispute. The system can determine a second likelihood that traversing to the interaction dispute may result in success. The system can provide the responsive message that can control the interaction dispute based on the first likelihood and the second likelihood. The responsive message can include a response to the interaction dispute.
A system can efficiently control access to an interactive computing environment. The system can receive authentication data of an authentication attempt associated with an entity. The system can determine, for the entity, a historical vector including features that include sub-features. The historical vector can be determined by generating synthetic data, generating weights, and determining probabilities. The synthetic data can be based on historical authentication attempts by entities other than the entity. The weights can correspond to sub-features of the historical vector. The probabilities can indicate a likelihood that a corresponding sub-feature is involved in the authentication attempt. The system can compare the historical vector to the authentication data. The system can generate a responsive message based on the comparison for controlling access to the interactive computing environment.
Systems and methods for automated historical risk assessment for risk mitigation in online access control are provided. An entity assessment server can receive a request to assess a risk indicator change from a first risk indicator to a second risk indicator. For each attribute used to generate the first risk indicator and second risk indicator, a first impact can be determined for changing from the first risk indicator to a third risk indicator between the first risk indicator and the second risk indicator. A second impact similarly can be determined for changing from the third risk indicator to the second risk indicator. Aggregating the first impact and the second impact can determine a total impact of each attribute. Assessment results can be generated to include a list of attributes ordered according to the respective total impact and transmitted to a remote computing device for use in improving the risk indicator.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
24.
ENHANCED RANK-ORDER FOR RISK ASSESSMENT USING PARAMETERIZED DECAY
A system can receive data about a target entity. The system can identify, for each data point included in the data, a set of parameters. The system can generate, based at least in part on the set of parameters, a rank-order list that includes the data. The rank-order list can be generated by a parameterized decay model. The system can provide the rank-order list to a user entity to control an interaction between the target entity and the user entity.
G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
In one example, a method includes building a first model including a first data set, the first data set excluding protected class. A second model is built including a second data set, the second data set including a subset of the first data set. The models may be used to generate and index score distributions. The distributions are compared to determine a self-report correlation. In response to determining the aggregate correlation is less than the first disparate impact threshold, the method generates a first prediction of disparate impact. The method then generates an aggregate correlation for attributes in the first model with the self-reported protected class attribute, the plurality of attributes being generated by the first model. In response to determining the aggregate correlation exceeds the second disparate impact threshold, the method generates a second prediction of disparate impact.
Various aspects of the present disclosure involve computing environments that provide third-party access-control support. For instance, an access-control computing system can access a secure identity repository having role history data from various contributor computing systems. The access-control computing system can compare an identified set of roles with a set of roles described by role history data for a target entity. The access-control computing system can determine, from the comparison, whether the target entity poses a security risk based on inconsistencies between the sets of roles, durations associated with the roles, or both. The access-control computing system can provide a client computing system with a dynamic access-control data structure that is generated based on the comparison. The dynamic access-control data structure allows the client computing system to output the security assessment to an end user or to otherwise facilitate further security measures with respect to the target entity.
G06F 9/46 - Dispositions pour la multiprogrammation
H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
27.
SYSTEM AND METHOD FOR CONTROLLING ACCESS TO A RESOURCE BASED ON A COMPLIANCE SCORE
A system can generate one or more compliance graphs and a compliance score that can be used at least in risk assessment operations. The system can access a request to visualize target entity data and calculate a compliance score for the target entity. The system can access attribute data. The system can generate one or more compliance graphs and a compliance score using the attribute data. The system can compare the compliance score to a compliance threshold and transmit a message including the results of the comparison to a remote system for controlling access of the target entity to an interactive computing environment.
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
28.
DATA VALIDATION TECHNIQUES FOR SENSITIVE DATA MIGRATION ACROSS MULTIPLE PLATFORMS
Techniques for validating large amounts of sensitive data migrated across multiple platforms without revealing the content of the sensitive data are provided. For example, a processing device can transform data in a first data file stored on a first platform to common data formats. The processing device can generate a first set of hash values. The processing device can receive a second set of hash values for a second data file stored on a second platform. The processing device can compare the first set of hash values and the second set of hash values and cause the first data file or the second data file to be modified based on a difference between the sets of hash values.
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
H04L 67/06 - Protocoles spécialement adaptés au transfert de fichiers, p. ex. protocole de transfert de fichier [FTP]
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
29.
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR IDENTIFYING IDENTITY MANIPULATION
A system can efficiently determine whether an identity is manipulated. The system can receive entity data and interaction data associated with a target entity. The system can determine, based on the entity data and the interaction data, one or more risk signals associated with the target entity using one or more artificial intelligence models. The system can generate a linked graph structure based on a first graph structure and a second graph structure each generated using the entity data and the interaction data. The system can apply the one or more risk signals to the linked graph structure to determine a risk indicator associated with the target entity. The system can provide a responsive message based on the risk indicator. The responsive message can be used to control access of the target entity to an interactive computing environment.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
30.
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR IDENTIFYING IDENTITY MANIPULATION
A system can efficiently determine whether an identity is manipulated. The system can receive entity data and interaction data associated with a target entity. The system can determine, based on the entity data and the interaction data, one or more risk signals associated with the target entity using one or more artificial intelligence models. The system can generate a linked graph structure based on a first graph structure and a second graph structure each generated using the entity data and the interaction data. The system can apply the one or more risk signals to the linked graph structure to determine a risk indicator associated with the target entity. The system can provide a responsive message based on the risk indicator. The responsive message can be used to control access of the target entity to an interactive computing environment.
Certain aspects involve building timing-prediction models for predicting timing of events that can impact one or more operations of machine-implemented environments. For instance, a computing system can generate program code executable by a host system for modifying host system operations based on the timing of a target event. The program code, when executed, can cause processing hardware to a compute set of probabilities for the target event by applying a set of trained timing-prediction models to predictor variable data. A time of the target event can be computed from the set of probabilities. To generate the program code, the computing system can build the set of timing-prediction models from training data. Building each timing-prediction model can include training the timing-prediction model to predict one or more target events for a different time bin within the training window. The computing system can generate and output program code implementing the models' functionality.
A method can be used to predict risk and provide explainable outcomes using machine learning based on wavelet analysis. A risk prediction model can be applied to time-series data for an attribute associated with a target entity to generate a risk indicator for the target entity. The risk prediction model can include a feature learning model and a risk classification model configured to generate the risk indicator as output. Parameters of the feature learning model can be accessed and a plurality of basis functions of a wavelet transformation can be applied on the parameters of the feature learning model to generate a set of parameter wavelet coefficients. Explanatory data can be generated for the risk indicator based on the set of parameter wavelet coefficients. A responsive message can be transmitted to a remote computing device including the risk indicator and the explanatory data for use in controlling access of the target entity to an interactive computing environment.
In some aspects, a computing system can use a machine learning model for resource management. For example, the system can receive a request for a set of steps associated with a target model output of a machine learning model. The request can include a starting input feature set and a number of steps. For each of the number of steps, the system can calculate a change to one or more features from the starting input feature set to arrive at the target model output based on a current position in feature space of the machine learning model. The system can update a feature vector by applying the change to the features of the starting input feature set and transmitting the set of steps. The system can then cause a resource of the external computing system to transition toward a position defined by the target model output.
36 - Services financiers, assurances et affaires immobilières
42 - Services scientifiques, technologiques et industriels, recherche et conception
45 - Services juridiques; services de sécurité; services personnels pour individus
Produits et services
(1) Consulting services in the field of life, health, property and casualty insurance; consulting services in the field of account origination and portfolio management; credit information services, namely, providing credit information relating to consumer or commercial applicants for credit, mortgage loans, utility services and employment and to fraud prevention; providing credit application processing; credit inquiry and consulting services; real estate appraisal services; providing an on-line credit information database featuring information relating to insurance, credit, financial data, mortgage loans, and employment, and to debt servicing; credit evaluation, analysis and alert services; and providing information relating to insurance, credit, mortgage loans and debt management; and excluding foreign exchange services and money market trading services.
(2) Providing non-downloadable software for risk analysis, identity verification, data analysis, risk modelling and analytics, decision making and analysis, in the field of fraud protection.
(3) Providing information over the Internet in the fields of identity verification and fraud protection; providing credit and financial fraud detection services.
35.
MACHINE-LEARNING TECHNIQUES FOR PREDICTING UNOBSERVABLE OUTPUTS
In some aspects, a computing system can generate and optimize a machine learning model to estimate an unobservable capacity of a target system or entity. The computing system can access training vectors which include training predictor variables, training performance indicators, and task quantities. A training performance indicator indicating performance outcome corresponding to the predictor variables and a task quantity associated with a task assigned to the target entity that leads to the training performance indicator. The machine learning model can be trained by performing adjustments of parameters of the machine learning model to minimize a loss function defined based on the training vectors. The trained machine learning model can be used to estimate the capacity of the target system or entity for handling tasks and be used in assigning tasks to the target entity according to the determined capacity.
In some aspects, a computing system can generate and optimize a machine learning model to estimate an unobservable capacity of a target system or entity. The computing system can access training vectors which include training predictor variables, training performance indicators, and task quantities. A training performance indicator indicating performance outcome corresponding to the predictor variables and a task quantity associated with a task assigned to the target entity that leads to the training performance indicator. The machine learning model can be trained by performing adjustments of parameters of the machine learning model to minimize a loss function defined based on the training vectors. The trained machine learning model can be used to estimate the capacity of the target system or entity for handling tasks and be used in assigning tasks to the target entity according to the determined capacity.
In some aspects, a machine learning (ML) model can be trained for risk assessment. The ML model can be trained to determine a risk indicator for a target entity from predictor variables associated with the target entity. The predictor variables are obtained from multiple sources with varying availability, and the training of the ML model is accomplished based on a multi-dimensional representation of common information from the set of data sources. Once generated, the risk indicator can be transmitted to a remote computing device in a responsive message for use in controlling access of the target entity to a computing environment.
In some aspects, a computing system can train a machine learning model for risk assessment. For example, the system can access a trained machine learning model to determine a final risk indicator of a target entity from a baseline data associated with the target entity and an alternative data associated with the target entity. The computing system can generate the final risk indicator of the target entity using the baseline data associated with the target entity and the alternative data associated with the target entity. The computing system can also transmit, to a remote computing device, a responsive message comprising at least the final risk indicator for use in controlling access of the target entity to one or more computing environments.
Various aspects involve explainable machine learning based on time-series transformation. For instance, a computing system accesses time-series data of a predictor variable associated with a target entity. The computing system generates a first set of transformed time-series data instances by applying a first family of transformations on the time-series data. Any non-negative linear combination of the first family of transformations forms an interpretable transformation of the time-series data. The computing system determines a risk indicator for the target entity indicating a level of risk associated with the target entity by inputting the first set of transformed time-series data instances into a machine learning model. The computing system transmits, to a remote computing device, a responsive message including the risk indicator. The risk indicator is usable for controlling access to one or more interactive computing environments by the target entity.
A system can efficiently control access to an interactive computing environment using similarity hashing. The system can receive a first similarity-preserving hash based on an interaction request associated with a target entity for requesting access to an interactive computing environment. The system can receive a second similarity-preserving hash based on entity data relating to an entity and including interaction data. The system can determine, based on a comparison between the first similarity-preserving hash and the second similarity-preserving hash, a likelihood that the interaction request is legitimate. The system can provide a responsive message based on a threshold relating to the likelihood, the responsive message usable to control access to the interactive computing environment.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
41.
TECHNIQUES FOR MITIGATING BACK PRESSURE, AUTO-SCALING THROUGHPUT, AND CONCURRENCY SCALING IN LARGE-SCALE AUTOMATED EVENT-DRIVEN DATA PIPELINES
Systems and methods for fine-tuned control over data transfer processes. An exemplary data transfer process may include: receiving a data stream at a storage service; receiving, at a first function, one or more notifications; in response to each notification, passing, by the first function, a message to a queue, the message comprising an address of a respective file within the storage service; receiving, at an invocation of a second function at a second computing service, one or more messages from the queue; retrieving, by the second function, data from one or more files based on the address in each of the one or more messages; and writing, by the second function, the data to a database. Systems and methods according to aspects of the present disclosure improve processes of transferring data from a data warehouse or database to a cloud-based database by mitigating back-pressure, auto-scaling throughput, and controlling concurrency scaling.
A system can generate an identity graph that can be arranged temporally for use at least in risk assessment operations and similar analyses. The system can receive a request to visualize entity data. The system can receive the entity data, which can include a set of identity data and a set of interaction data. The system can generate a temporal identity graph using the entity data. The temporal identity graph can temporally link the identity of the entity with the interactions associated with the entity. The system can generate a graphical user interface that may be configured to provide the temporal identity graph in response to the request to visualize the entity data. The graphical user interface can include interactive elements representing the temporal identity graph. Each interactive element can be selected by a user of the graphical user interface to display previously non-displayed information.
A system can generate a risk assessment associated with a target entity. The system can determine an attribute tier for each entity in a set of entities. For each attribute tier, the system can: generate a model configured to predict a percent change in the attribute over a time period for each entity in the respective attribute tier; determine the percent change in the attribute for each entity in the respective attribute tier using the model associated with the respective attribute tier; rank each entity in the attribute tier based on the predicted percent change in the attribute; and assign a score to each entity in the attribute tier based on the rank of the respective entity and on a preconfigured distribution. The system can determine a risk indicator based, in part, on the score.
In some aspects, a record-matching computing system for detecting fragmented records is provided. The record-matching system is configured to identify a list of candidate records for merging from a set of data records. The record-matching system determines a matching decision for each pair of candidate records in the list and generates a graph. The graph includes nodes representing respective candidate records and edges connecting the nodes. Each edge represents a match between a pair of nodes connected by the edge according to the matching decisions. The record-matching system detects a connected component in the graph from which a qualified connected component is identified based on the minimum connectivity of the qualified connected component. The record-matching system updates the set of data records stored by merging candidate records represented by the nodes in the qualified connected component.
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage
45.
RECORDS MATCHING TECHNIQUES FOR FACILITATING DATABASE SEARCH AND FRAGMENTED RECORD DETECTION
In some aspects, a record-matching computing system for matching records to facilitate database search and fragmented records detection is provided. The record-matching computing system is configured to receiving a query record and search in a data repository storing data records for a record that matches the query record. The record-matching computing system retrieves a reference record from the data records and generates multiple identifier scores. Each identifier score measures a degree of matching between the corresponding identifiers in the query record and the reference record. The record-matching computing system generates an overall matching score by combining at least two of the identifier scores and determines the reference record as a match to the query record based on the overall matching score exceeding a threshold value.
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
G06F 16/2458 - Types spéciaux de requêtes, p. ex. requêtes statistiques, requêtes floues ou requêtes distribuées
46.
RECORDS MATCHING TECHNIQUES FOR FACILITATING DATABASE SEARCH AND FRAGMENTED RECORD DETECTION
In some aspects, a record-matching computing system for matching records to facilitate database search and fragmented records detection is provided. The record-matching computing system is configured to search for a data record that matches a query record. The record-matching computing system retrieves a reference record from data records and generates multiple identifier attributes for the query record and reference record, including identifier scores and compound scores. Each identifier score measures a degree of matching between the corresponding identifiers in the query record and reference record. A compound score is generated by combining two or more identifier scores. The record-matching computing system applies the identifier attributes to a machine learning model configured to predict a match classification based on input identifier attributes for a pair of data records. The record-matching server can identify the reference records as a match to the query record based on the match classification indicating a match.
In some aspects, techniques for creating representative and informative training datasets for the training of machine-learning models are provided. For example, a risk assessment system can receive a risk assessment query for a target entity. The risk assessment system can compute an output risk indicator for the target entity by applying a machine learning model to values of informative attributes associated with the target entity. The machine learning model may be trained using training samples selected from a representative and informative (RAI) dataset. The RAI dataset can be created by determining the informative attributes based on attributes used by a set of models and further extracting representative data records from an initial training dataset based on the determined informative attributes. The risk assessment system can transmit a responsive message including the output risk indicator for use in controlling access of the target entity to an interactive computing environment.
The present disclosure involves systems and methods for identity authentication across multiple institutions using a trusted mobile device as a proxy for a user login. In one example, the operations include identifying a request to trust a particular user associated with a first entity in a digital ID network. A set of personally identifiable information (PII) associated with the user is obtained via the first entity and an identity verification (IDV)/fraud risk analysis is performed. In response to satisfying the analysis, instructions are transmitted to the user to verify the identity via a mobile trust application on an associated mobile device. Upon verification, the mobile device is bound to the user within the digital ID network along with a digital ID associated with the particular user. The digital ID can be used by other entities registered within the digital ID network to authenticate the user.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p. ex. lecture de la lumière blanche réfléchie
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 30/018 - Certification d’entreprises ou de produits
H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services
In some embodiments, a data visualization system accesses data entries associated with entities and obtained from multiple data sources. The data visualization system generates a classification map for the entities by classifying the entities into groups based on the data entries from the multiple data sources. The groups are arranged in the classification map according to values of the data entries of the entities. The data visualization system determines one or more metrics for the groups. The data visualization system further determines visualizations based on the classification map, each visualization representing a metric or the data entries from one of the data sources. The data visualization system generates, for inclusion in a user interface of the system, selectable interface elements configured for invoking an editing tool for updating the visualizations. The selectable interface elements for the visualizations are arranged in the respective visualizations according to the classification map.
Techniques are described herein for applying natural language processing (NLP) techniques to time series data to derive attributes of an object for use with a machine-learning model. In one example, a system can receive a time series associated with an object over a time window, where the time series includes a set of discrete values. The system can then generate a time series encoding based on the time series. The system can provide the time series encoding as input to a trained natural language processing (NLP) model, which can generate one or more output embeddings based on the time series encoding. Next, the system can determine at least one attribute associated with the object based on the one or more output embeddings. The system can then provide the attributes for use with a machine-learning model, which may for example be configured to predict a future characteristic of the object.
Search indexes can be automatically generated and used for expediting searching of a computerized database. For example, a system can access an inquiry dataset that includes relationships between prior inquiries and returned records from a database. The system can then generate a set of Boolean indexes based on the prior inquiries. The system can then identify frequent indexes that occur at least a threshold number of times in the set of Boolean indexes and that have estimated candidate sizes that are less than a threshold size. The system can then select the frequent index with the highest frequency from among the frequent indexes. The selected frequent index can be subsequently used to expedite searching of the database in response to receiving a search query associated with the frequent index from a client device.
A system can generate a risk report associated with a target entity. For example, the system can receive a request for a risk report associated with a target entity. The system can retrieve a set of records associated with the target entity where each record is associated with a state. The system can generate a first GUI including a selectable list of states associated with each record of the set of records. The system can receive a selection of a first subset of states. The system can transmit, to a remote computing device, the risk report including at least information from a first subset of records associated with the first subset of states for use in controlling access of the target entity to one or more interactive computing environments. The risk report can be used for controlling access of the target entity to one or more interactive computing environments.
Systems and methods for secure resource management are provided. A secure resource management system receives from a client computing system associated with a resource provider a query for classifying a resource user associated with the resource provider. The secure resource management system determining a set of resource abuser criteria for classifying the resource user as a resource abuser. The secure resource management system determines that the resource user is a resource abuser or a potential resource abuser based on the set of resource abuser criteria and a resource transaction history associated with the resource user. Based on determining that the resource user is a resource abuser or a potential resource abuser, the secure resource management system generates and transmits a response to the query to the client computing system. The response can be used to restrict or deny access to the resource by the resource user.
Systems and methods for improving machine learning model predictive capabilities relative to time dependent unbalanced datasets. A separately trained (precursor) data classification machine learning model is utilized to refine training data by removing the time dependence of certain data samples in a given dataset, identify initially misidentified or misclassified data samples, and accordingly, modify a supervisory signal associated with the data used relative to subsequently training a main machine learning model. Systems and methods according to aspects of the present disclosure improve the ability of the main machine learning model to make accurate predictions with respect time dependent unbalanced datasets, while requiring less memory and processor resources for training.
Various aspects involve a monotonic recurrent neural network (MRNN) trained for risk assessment or other purposes. For instance, the MRNN is trained to compute a risk indicator from a predictor variable. Training the MRNN includes adjusting weights of nodes of the MRNN subject to a set of monotonicity constraints, wherein the set of monotonicity constraints causes output risk indicators computed by the RNN to be a monotonic function of input predictor variables. The trained monotonic RNN can be used to generate an output risk indicator for a target entity.
A telecommunications network server system provides a digital identifier to a user device. The digital identifier may include identification data corresponding to a user of the user device. In addition, the telecommunications network server system receives, from one or more third-party systems, requests to authenticate the user for an electronic transaction with the respective third-party system. The telecommunications network server system provides a unique electronic transaction code to each third-party system. Responsive to receiving from the user device one of the unique electronic transaction codes, the telecommunications network server system provides, to the respective third-party system, authentication of the user.
H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
A system can generate content recommendations and facilitate interactions using machine-learning. The system can receive a request from a provider entity. The system can receive entity data and interaction data associated with a target entity. The system can generate at least a first graph structure and a second graph structure. The system can generate a linked graph structure based on the first graph structure and the second graph structure. The system can determine among a plurality of operations, one or more target operations to perform on data included in the linked graph structure. The system can execute using a trained machine-learning model, the target operations to generate a content recommendation for facilitating an interaction. The system can provide a responsive message based on the content recommendation usable to facilitate the interaction.
In some aspects, a computing system can generate and optimize a hybrid machine learning model for risk assessment based on predictor variables associated with a target entity. The hybrid machine learning model can be trained using training vectors with sets of training predictor variables and training outputs corresponding to the respective sets of training predictor variables. The predictor variables associated with the target entity may include unknown values and the training predictor variables or trainings output may also include unknown values. Additionally, the computing system can generate explanatory data for the target entity to indicate relationships between changes in the risk indicator and changes in the predictor variables associated with the target entity. The risk indicator and the explanatory data can be used in controlling access of the target entity to interactive computing environments.
In some aspects, systems and methods for efficiently clustering a large-scale dataset for improving the construction and training of machine-learning models, such as neural network models, are provided. Clustering can include determining a number of clusters to be generated for the dataset. A dataset used for training a neural network model configured can be clustered into a set of clusters. The clustering can include determining the number of clusters, determining special features for the determined number of clusters, and re-clustering the dataset based on the special features. The neural network can be trained based on training samples selected from the set of clusters. In some aspects, the trained neural network model can be utilized to satisfy risk assessment queries to compute output risk indicators for target entities. The output risk indicator can be used to control access to one or more interactive computing environments by the target entities.
G06N 3/088 - Apprentissage non supervisé, p. ex. apprentissage compétitif
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
G06N 3/084 - Rétropropagation, p. ex. suivant l’algorithme du gradient
60.
Techniques for prediction models using time series data
Various aspects involve a lagged prediction model trained for risk assessment or other purposes. For instance, a risk assessment computing system receives a risk assessment query for a target entity and provides an input predictor record for the target entity to a lagged prediction model. The input predictor record includes a first group of lagged values from a first time-series attribute associated with the target entity. The lagged prediction model is trained by implementing a group feature selection technique configured to select the first time-series attribute as input and to deselect a second time-series attribute associated with the target entity. The risk assessment computing system computes an output risk indicator from the input predictor record and transmits the output risk indicator to a remote computing system. The output risk indicator can be used to control access by the target entity to one or more interactive computing environments.
H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 43/04 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux
H04L 43/067 - Génération de rapports en utilisant des rapports de délai
61.
Automated path-based recommendation for risk mitigation
Systems and methods for automated path-based recommendation for risk mitigation are provided. An entity assessment server, responsive to a request for a recommendation for modifying a current risk assessment score of an entity to a target risk assessment score, accesses an input attribute vector for the entity and clusters of entities defined by historical attribute vectors. The entity assessment server assigns the input attribute vector to a particular cluster and determines a requirement on movement from a first point to a second point in a multi-dimensional space based on the statistics computed from the particular cluster. The first point corresponds to the current risk assessment score and the second point corresponds to the target risk assessment score. The entity assessment server computes an attribute-change vector so that a path defined by the attribute-change vector complies with the requirement and generates the recommendation from the attribute-change vector.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projetsPlanification d’entreprise ou d’organisationModélisation d’entreprise ou d’organisation
G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
Systems and methods for automated historical risk assessment for risk mitigation in online access control are provided. An entity assessment server can receive a request to assess a risk indicator change from a first risk indicator to a second risk indicator. For each attribute used to generate the first risk indicator and second risk indicator, a first impact can be determined for changing from the first risk indicator to a third risk indicator between the first risk indicator and the second risk indicator. A second impact similarly can be determined for changing from the third risk indicator to the second risk indicator. Aggregating the first impact and the second impact can determine a total impact of each attribute. Assessment results can be generated to include a list of attributes ordered according to the respective total impact and transmitted to a remote computing device for use in improving the risk indicator.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
63.
Dual deep learning architecture for machine-learning systems
Certain aspects involve a machine-learning query system that uses a dual deep learning network to service queries and other requests. In one example, a machine-learning query system services a query received from a client computing system. A dual deep learning network included in the machine-learning query system matches an unstructured input data object, received from the client computing system, to an unstructured reference data object. The matching may include generating an input feature vector by an embedding subnetwork, based on the unstructured input data object. The matching may also include generating an output probability by a relationship subnetwork, based on the input feature vector and a relationship feature vector that is based on the unstructured reference data object. The machine-learning query system may transmit a responsive message to the client system.
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
G06F 16/583 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
G06F 18/21 - Conception ou mise en place de systèmes ou de techniquesExtraction de caractéristiques dans l'espace des caractéristiquesSéparation aveugle de sources
G06V 10/44 - Extraction de caractéristiques locales par analyse des parties du motif, p. ex. par détection d’arêtes, de contours, de boucles, d’angles, de barres ou d’intersectionsAnalyse de connectivité, p. ex. de composantes connectées
G06V 10/764 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant la classification, p. ex. des objets vidéo
G06V 40/16 - Visages humains, p. ex. parties du visage, croquis ou expressions
64.
Automated decision techniques for controlling resource access
A durability assessment system may receive a request, from a computing system, for a durability index describing an entity. The durability assessment system may determine the durability index based on information about the resource usage by the entity, such as a resource availability score or a resource allocation score. The durability assessment system may compare the obtained resource availability score and resource allocation score to ranges associated with a set of durability indices. Based on the comparison, the durability assessment system may determine a durability index for the entity. The durability index may indicate an ability of the entity to return accessed resources. In some cases, the durability assessment system may provide the durability index to an allocation computing system that is configured to determine whether to grant access to resources based on the durability index.
H04L 47/70 - Contrôle d'admissionAllocation des ressources
H04L 47/74 - Mesures pour pallier la non-disponibilité des ressources
H04L 47/762 - Contrôle d'admissionAllocation des ressources en utilisant l'allocation dynamique des ressources, p. ex. renégociation en cours d'appel sur requête de l'utilisateur ou sur requête du réseau en réponse à des changements dans les conditions du réseau déclenchée par le réseau
H04L 47/78 - Architectures d'allocation des ressources
65.
Real-time servicing of verification queries using hybrid data sources
In some aspects, a verification system can receive a verification query from a verifier computing system for requesting verification of characteristics of an entity involved in an online interaction. The verification query can include a unique identifier (“UID”) of the entity. The verification computing system can query a verification repository in the verification computing system based on the UID. Additionally, the verification computing system can query an external-source cache using the UID. In response to determine a match for the UID in the external-source cache, the verification computing system can request external sensitive data records for the entity from an external source corresponding to the external-source cache. Generating consolidated sensitive data records can involve consolidating the external sensitive data records and internal sensitive data records obtained through querying the verification repository. A verification result, generated using the consolidated sensitive data records, can be transmitted to the verifier computing system.
A system can efficiently control access to an interactive computing environment using an entity profile. The system can receive entity data relating to a target entity. The entity data can include real-time data and external data. The system can extract features from the entity data. The system can generate signals based on the features. Each signal can include a subset of the features, and each signal can correspond to an amount of risk associated with the target entity. The system can generate, based on the signals, an entity profile. The system can provide a responsive message based on the entity profile that can be used to control access to an interactive computing environment.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
A system can efficiently control access to an interactive computing environment using an entity profile. The system can receive entity data relating to a target entity. The entity data can include real-time data and external data. The system can extract features from the entity data. The system can generate signals based on the features. Each signal can include a subset of the features, and each signal can correspond to an amount of risk associated with the target entity. The system can generate, based on the signals, an entity profile. The system can provide a responsive message based on the entity profile that can be used to control access to an interactive computing environment.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
68.
Facilitating queries of encrypted sensitive data via encrypted variant data objects
Various aspects of this disclosure provide digital data processing systems for using encrypted variant data objects to facilitate queries of sensitive data. In one example, a digital data processing system can receive sensitive data about an entity. The digital data processing system can create, in an identity data repository and from the sensitive data, a searchable secure entity data object for the entity. The searchable secure entity data object is usable for servicing a query regarding the entity. For instance, a transformed query parameter can be generated from a query parameter in the query. The query can be serviced by matching the transformed query parameter to tokenized variant data in the searchable secure entity data object and retrieving tokenized sensitive data from the searchable secure entity data object.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Employment verification services Platform as a Service (PAAS) featuring non-downloadable software for use by employers, namely, providing a secure solution for facilitating completion, review, and retention of employer-related forms, employment verification, compliance with federal laws, management of tax credits, generation of reports, measurement of compliance. risk decisioning and analysis, creation of audit trails, and responding to audits; Computer services, namely, providing an interactive web site that allows users to manage Affordable Care Act compliance, employee benefits and workforce hours; Platform as a service (PAAS) featuring computer software platforms for managing Affordable Care Act compliance, tax credits, employee benefits and workforce hours, risk decisioning and analysis, creation of audit trails, and responding to audits; Providing a web hosting platform in the nature of providing a website featuring technology that enables users to manage affordable care act (ACA) compliance, employee benefits, and respond to audits
70.
Facilitating entity resolution, keying, and search match without transmitting personally identifiable information in the clear
In some aspects, an entity-resolution computing system for entity resolution is provided. The entity-resolution computing system includes an entity-resolution server configured for correlating data objects from an identity data repository that contains account or transaction data for entities based on the data objects including a common portion of the account or transaction data. The entity-resolution server updates the identity data repository to include an entity identifier that links the data objects and indicates that the data objects refer to a common entity. The entity-resolution server creates an entity-resolution data structure having the data objects with the entity identifier and a new variant data object containing a modified version of account or transaction data that match the common entity. The entity-resolution server encrypts the entity-resolution data structure and causes the encrypted entity-resolution data structure to be transmitted to a client computing system for use in augmenting client data.
A host computing system determines a wavelet transform that represents time-series values of predictor data samples. The host computing system applies the wavelet transform to the predictor data samples to generate wavelet predictor variable data comprising a first set and a second set of shift value input data for a first scale and a second scale. The host computing system computes a set of probabilities for a target event by applying a set of timing-prediction models to the first set and the second set of shift value input data. The host computing system determines an event prediction from the set of probabilities and modifies a host system operation based on the determined event prediction.
Methods described herein generate executable program code based on sequence codes, such that the executable program code is executable by a computer processor. According to such a method, a command is received to generate executable program code. Via a code-building interface, user input is received indicating an operation to be performed by the executable program code, a data type for to the executable program code, and a condition for applying the executable program code. A sequence code is constructed to represent the user input, where the sequence code includes a sequence of character sets. From the sequence code, a first character set corresponding to the operation, a second character set corresponding to the data type, and a third character set corresponding to the condition are extracted. Mapping data is applied to the first character set, the second character set, and the third character set to generate the executable program code.
Aspects and examples are disclosed for improving multi-factor authentication techniques to control access to secured electronic resources. In one example, a decisioning computer system evaluates, based on a passive-dimension decision process, an access request, received from a user device, for a secured electronic resource. The passive-dimension decision process can evaluate dimensions associated with the access request, such as identity or device characteristics, to determine whether the dimensions of the access request are outside of norms for the user. Based on the passive-dimension decision model, the decisioning computing device may communicate to the user device an access decision, the access decision describing one or more of an access authorization, a denial of access, or a supplemental authentication challenge.
In some aspects, a content-extraction system can receive a query from a client device and generate a result set of digital content responsive to the query. For instance, the content-extraction system can obtain, from a search system, a set of digital content matching one or more keywords. The content-extraction system can exclude digital content items lacking core content, digital content items with duplicative content, or both. In some aspects, the content-extraction system can determine, for one or more remaining digital content items, a content attribute score. The content-extraction system can select, as the result set of digital content, a subset of digital content based on the content attribute scores. The content-extraction system can output the result set to the client device.
Certain embodiments involve providing explainable risk assessment via multi-stage machine-learning techniques. A risk assessment server can determine, in response to a risk assessment query for a target entity, a first risk indicator for the target entity by applying a first risk assessment model to predictor variables associated with the target entity. Responsive to determining that the first risk indicator indicates a risk higher than a threshold value, the risk assessment server can generate explanatory data for the predictor variables and determine a second risk indicator for the target entity by applying a second risk assessment model to the predictor variables associated with the target entity. A response message can be generated and transmitted to include the first risk indicator, the explanatory data, and the second risk indicator, for use in controlling access to one or more interactive computing environments by the target entity.
Certain aspects involve updating data structures to indicate relationships between attribute trends and response variables used for training automated modeling systems. For example, a data structure stores data for training an automated modeling algorithm. The training data includes attribute values for multiple entities over a time period. A computing system generates, for each entity, at least one trend attribute that is a function of a respective time series of attribute values. The computing system modifies the data structure to include the generated trend attributes and updates the training data to include trend attribute values for the trend attributes. The computing system trains the automated modeling algorithm with the trend attribute values from the data structure. In some aspects, trend attributes are generated by applying a frequency transform to a time series of attribute values and selecting, as trend attributes, some of the coefficients generated by the frequency transform.
A system can efficiently control access to an interactive computing environment. The system can receive authentication data of an authentication attempt associated with an entity. The system can determine, for the entity, a historical vector including features that include sub-features. The historical vector can be determined by generating synthetic data, generating weights, and determining probabilities. The synthetic data can be based on historical authentication attempts by entities other than the entity. The weights can correspond to sub-features of the historical vector. The probabilities can indicate a likelihood that a corresponding sub-feature is involved in the authentication attempt. The system can compare the historical vector to the authentication data. The system can generate a responsive message based on the comparison for controlling access to the interactive computing environment.
A system can efficiently control access to an interactive computing environment. The system can receive authentication data of an authentication attempt associated with an entity. The system can determine, for the entity, a historical vector including features that include sub-features. The historical vector can be determined by generating synthetic data, generating weights, and determining probabilities. The synthetic data can be based on historical authentication attempts by entities other than the entity. The weights can correspond to sub-features of the historical vector. The probabilities can indicate a likelihood that a corresponding sub-feature is involved in the authentication attempt. The system can compare the historical vector to the authentication data. The system can generate a responsive message based on the comparison for controlling access to the interactive computing environment.
In some aspects, a computing system can generate and optimize a neural network for risk assessment. Input predictor variables can be analyzed to identify common factors of these predictor variables. The neural network can be trained to enforce a monotonic relationship between each common factor of the input predictor variables and an output risk indicator. The training of the neural network can involve solving an optimization problem under this monotonic constraint. The optimized neural network can be used both for accurately determining risk indicators for target entities using predictor variables and determining explanation codes for the predictor variables. Further, the risk indicators can be utilized to control the access by a target entity to an interactive computing environment for accessing services provided by one or more institutions.
In some aspects, a gateway server can unlock or unfreeze access to data about a user by third parties without requiring the user to navigate completely away from a third-party website through which the user is executing an electronic transaction. The gateway server can receive a request to unlock or unfreeze data through the third-party website hosted by a third-party web server. The gateway server can output a user interface that is displayable simultaneously with the third-party website. Through the user interface, the gateway server can receive sign-in data such as log-in credentials of the user and consent to share data about the user with the third-party web server. The gateway server can output a command to unlock or unfreeze data about the user and to share the data with the third-party web server. Based on the shared data, the transaction can be completed at the third-party web server.
The present disclosure involves systems and methods for identity authentication across multiple institutions using a trusted mobile device as a proxy for a user login. In one example, the operations include identifying a request to trust a particular user associated with a first entity in a digital ID network. A set of personally identifiable information (PII) associated with the user is obtained via the first entity and an identity verification (IDV)/fraud risk analysis is performed. In response to satisfying the analysis, instructions are transmitted to the user to verify the identity via a mobile trust application on an associated mobile device. Upon verification, the mobile device is bound to the user within the digital ID network along with a digital ID associated with the particular user. The digital ID can be used by other entities registered within the digital ID network to authenticate the user.
H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
H04W 12/67 - Sécurité dépendant du contexte dépendant du risque, p. ex. choix du niveau de sécurité selon les profils de risque
G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p. ex. lecture de la lumière blanche réfléchie
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06Q 30/018 - Certification d’entreprises ou de produits
H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services
H04W 12/63 - Sécurité dépendant du contexte dépendant de la localisationSécurité dépendant du contexte dépendant de la proximité
82.
GRAPH-BASED TECHNIQUES FOR DETECTING SYNTHETIC ONLINE IDENTITIES
In some aspects, a computing system is configured to use graph-based techniques to detect synthetic identities. The computing system can generate a collection of graphs based on account data and transaction data for online entities. The collection of graphs includes multiple graph communities, each graph community including nodes and edges. Each node represents a user and an edge between a first node and a second node indicates a user represented by the second node is an authorized user of the user represented by the first node. The computing system can identify a clique graph community in the collection of graphs and compare the identified clique graph community with a known clique graph community that includes synthetic identities. The computing system can determine nodes in the identified clique graph community to be synthetic identities based on determining that the identified clique graph community is equivalent to the known clique graph community.
A telecommunications network server system provides a digital identifier to a user device. The digital identifier may include identification data corresponding to a user of the user device. In addition, the telecommunications network server system receives, from one or more third-party systems, requests to authenticate the user for an electronic transaction with the respective third-party system. The telecommunications network server system provides a unique electronic transaction code to each third-party system. Responsive to receiving from the user device one of the unique electronic transaction codes, the telecommunications network server system provides, to the respective third-party system, authentication of the user.
H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
An auditing system executes a first machine learning model on a first computing platform using input data to generate first output data. The auditing system executes a second machine learning model on a second computing platform using the input data to generate second output data. The second machine learning model is generated by migrating the first machine learning model to the second computing platform. The auditing system determines one or more performance metrics based on comparing the first output data to the second output data. The auditing system classifies, based on the one or more performance metrics, the second machine learning model with a classification. The classification comprises a passing classification or a failing classification. The auditing system causes the second model to be modified responsive to classifying the second model with a failing classification.
In some aspects, a computing system can determine a set of attributes based on analyzing input data using attribute templates written in a production-ready programming language. The computing system can generate attribute definitions for the set of attributes using the attribute templates and deploy the attribute definitions for the set of attributes to a production environment of a software program. The software program is written in a programming language compatible with the production-ready programming language. The computing system can monitor the performance of the set of attributes in the production environment of the software program and cause the attribute definitions of the plurality of attributes to be modified based on the monitoring.
G16H 10/20 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients pour des essais ou des questionnaires cliniques électroniques
86.
Machine-learning techniques for risk assessment based on multiple data sources
Systems and methods for using machine-learning techniques to provide risk assessment based on multiple sources of data are described herein. Data about an entity can be received, and the data can be authenticated. Integrated risk data about the entity can be received. The integrated risk data can include traditional risk assessment data and nontraditional risk assessment data. An integrated risk assessment value can be determined based on the integrated risk data by aligning a first output from a first risk assessment model and a second output by a second risk assessment model. A responsive message including at least the integrated risk assessment value and associated information for the entity can be transmitted to a remote computing device for use in controlling access of the entity to one or more interactive computing environments.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
87.
Consolidation of data sources for expedited validation of risk assessment data
Systems and methods for consolidating data sources for expediting validation processes are described herein. A user interface can be provided to a first entity. First risk assessment data associated with the first entity can be received via the user interface. Second risk assessment data associated with the first entity can be received. The first risk assessment data and the second risk assessment data can be validated. The first risk assessment data and the second risk assessment data can be output for display on the user interface. A responsive message including the validated first risk assessment data and the validated second risk assessment data can be transmitted to a remote computing device for use in controlling access of the first entity to one or more interactive computing environments.
A system receives, from a remote computing device, a query for a timing of an adverse event associated with a target entity. The system determines, using a timing prediction model trained using a training process, the timing of the adverse event for the target entity from predictor variables associated with the target entity. The training process includes accessing an observational journal comprising historical panel data of the target entity including values of predictor variables for one or more time points and generating, from historical panel data, an augmented time series by augmenting the historical panel data with values of predictor variables for at time points for which the historical panel data does not include values of predictor variables. The system transmits to the remote computing device, a responsive message including at least the timing of the adverse event for use in controlling access of the target entity to one or more interactive computing environments.
Various aspects involve unified explainable machine learning for segmented risk assessment. For example, a computing device can determine, using a unified model built from segment models, a risk indicator for a target entity from predictor variables associated with the target entity. The target entity belongs to one of a plurality of entity segments each associated with a segment model of the segment models. The unified model is generated by: accessing training samples for the entity segments; training the segment models using respective training samples for the entity segments; constructing the unified risk prediction model by stacking the trained segment models; and training the unified risk prediction model using the training samples for the entity segments. The computing device can transmit, to a remote computing device, a responsive message including at least the risk indicator for use in controlling access of the target entity to an interactive computing environment.
A method can be used to predict risk and provide explainable outcomes using machine learning based on wavelet analysis. A risk prediction model can be applied to time-series data for an attribute associated with a target entity to generate a risk indicator for the target entity. The risk prediction model can include a feature learning model and a risk classification model configured to generate the risk indicator as output. Parameters of the feature learning model can be accessed and a plurality of basis functions of a wavelet transformation can be applied on the parameters of the feature learning model to generate a set of parameter wavelet coefficients. Explanatory data can be generated for the risk indicator based on the set of parameter wavelet coefficients. A responsive message can be transmitted to a remote computing device including the risk indicator and the explanatory data for use in controlling access of the target entity to an interactive computing environment.
Various aspects involve explainable machine learning based on time-series transformation. For instance, a computing system accesses time-series data of a predictor variable associated with a target entity. The computing system generates a first set of transformed time-series data instances by applying a first family of transformations on the time-series data. Any non-negative linear combination of the first family of transformations forms an interpretable transformation of the time-series data. The computing system determines a risk indicator for the target entity indicating a level of risk associated with the target entity by inputting the first set of transformed time-series data instances into a machine learning model. The computing system transmits, to a remote computing device, a responsive message including the risk indicator. The risk indicator is usable for controlling access to one or more interactive computing environments by the target entity.
Techniques for validating large amounts of sensitive data migrated across multiple platforms without revealing the content of the sensitive data are provided. For example, a processing device can transform data in a first data file stored on a first platform to common data formats. The processing device can generate a first set of hash values. The processing device can receive a second set of hash values for a second data file stored on a second platform. The processing device can compare the first set of hash values and the second set of hash values and cause the first data file or the second data file to be modified based on a difference between the sets of hash values.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
G06F 21/64 - Protection de l’intégrité des données, p. ex. par sommes de contrôle, certificats ou signatures
93.
Data validation techniques for sensitive data migration across multiple platforms
Techniques for validating large amounts of sensitive data migrated across multiple platforms without revealing the content of the sensitive data are provided. For example, a processing device can transform data in a first data file stored on a first platform to common data formats. The processing device can generate a first set of hash values. The processing device can receive a second set of hash values for a second data file stored on a second platform. The processing device can compare the first set of hash values and the second set of hash values and cause the first data file or the second data file to be modified based on a difference between the sets of hash values.
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
H04L 67/06 - Protocoles spécialement adaptés au transfert de fichiers, p. ex. protocole de transfert de fichier [FTP]
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
94.
MACHINE-LEARNING TECHNIQUES FOR RISK ASSESSMENT BASED ON CLUSTERING
Systems and methods for predicting future risk for a target entity are provided. A risk assessment system receives historical risk assessment data of the target entity and identifies a target cluster that matches the historical risk assessment data. The target cluster is identified from a group of clusters determined using high dimensional clustering based on risk assessment data of a set of entities. The risk assessment system identifies a set of nearest neighbors of the target cluster and determines a prediction of future risk for the target entity based on the target cluster and the set of nearest neighbors. The risk assessment system transmits a responsive message, which can include the prediction of future risk, to a remote computing device for use in controlling access of the target entity to one or more interactive computing environments.
Bayesian modeling can be used for risk assessment. For example, a computing device determines, using a Bayesian prediction model, a risk indicator for a target entity from predictor variables associated with the target entity. The Bayesian prediction model determines the risk indicator based on a set of parameters associated with the Bayesian prediction model. The Bayesian prediction model is generated based on an initial training dataset. The initial training dataset includes training records and predictor variables. The Bayesian prediction model can be generated by calculating the set of parameters based on the initial training dataset. The Bayesian prediction model can be updated by updating the set of parameters using an additional training dataset. The computing device transmits, to a remote computing device, the risk indicator for use in controlling access of the target entity to one or more interactive computing environments.
Bayesian modeling can be used for risk assessment. For example, a computing device determines, using a Bayesian prediction model, a risk indicator for a target entity from predictor variables associated with the target entity. The Bayesian prediction model determines the risk indicator based on a set of parameters associated with the Bayesian prediction model. The Bayesian prediction model is generated based on an initial training dataset. The initial training dataset includes training records and predictor variables. The Bayesian prediction model can be generated by calculating the set of parameters based on the initial training dataset. The Bayesian prediction model can be updated by updating the set of parameters using an additional training dataset. The computing device transmits, to a remote computing device, the risk indicator for use in controlling access of the target entity to one or more interactive computing environments.
Certain aspects involve providing automated performance monitoring of statistical models. For example, a processing device is used for performing a statistical analysis on information in an archive to extract historical data, scores, and attributes. The processing device calculates performance metrics based at least in part on the historical data, scores, and attributes. The processing device pre-calculates summary performance data based at least in part on the performance metrics. The summary performance data is stored in files with predefined layouts, which are stored in a non-transitory, computer-readable medium. Segmented data is presented from a file to a user through a graphical user interface (GUI). In some aspects, various reports of the segmented data are presented interactively by detecting a selection by the user of a segmentation and displaying the corresponding segmented data.
In some aspects, a computing system can improve a machine learning model for risk assessment by removing or reducing bias in the machine learning model. The training process for the machine learning model can include training the machine learning model using training samples, obtaining data for a protected attribute, and calculating a bias metric using the data for the protected attribute and data obtained from the trained machine learning model. Based on the bias metric, bias associated with the machine learning model can be detected. The machine learning model can be modified based on the detected bias and re-trained. The re-trained machine learning model can be used to predict a risk indicator for a target entity. The predicted risk indicator can be transmitted to a remote computing device and be used for controlling access of the target entity to one or more interactive computing environments.
In some aspects, a record-matching computing system for matching records to facilitate database search and fragmented records detection is provided. The record- matching computing system is configured to search for a data record that matches a query record. The record-matching computing system retrieves a reference record from data records and generates multiple identifier attributes for the query record and reference record, including identifier scores and compound scores. Each identifier score measures a degree of matching between the corresponding identifiers in the query record and reference record. A compound score is generated by combining two or more identifier scores. The record-matching computing system applies the identifier attributes to a machine learning model configured to predict a match classification based on input identifier attributes for a pair of data records. The record-matching server can identify the reference records as a match to the query record based on the match classification indicating a match.
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
G06F 16/2458 - Types spéciaux de requêtes, p. ex. requêtes statistiques, requêtes floues ou requêtes distribuées
100.
FRAGMENTED RECORD DETECTION BASED ON RECORDS MATCHING TECHNIQUES
In some aspects, a record-matching computing system for detecting fragmented records is provided. The record-matching system is configured to identify a list of candidate records for merging from a set of data records. The record-matching system determines a matching decision for each pair of candidate records in the list and generates a graph. The graph includes nodes representing respective candidate records and edges connecting the nodes. Each edge represents a match between a pair of nodes connected by the edge according to the matching decisions. The record-matching system detects a connected component in the graph from which a qualified connected component is identified based on the minimum connectivity of the qualified connected component. The record-matching system updates the set of data records stored by merging candidate records represented by the nodes in the qualified connected component.
G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet