Equifax Inc.

États‑Unis d’Amérique

Retour au propriétaire

1-100 de 375 pour Equifax Inc. et 5 filiales Trier par
Recheche Texte
Affiner par
Type PI
        Brevet 297
        Marque 78
Juridiction
        États-Unis 246
        International 107
        Canada 17
        Europe 5
Propriétaire / Filiale
[Owner] Equifax Inc. 355
Anakam, Inc. 9
IXI Corporation 7
TrustedID, Inc. 2
IntelliReal LLC 1
Voir plus
Date
Nouveautés (dernières 4 semaines) 3
2025 octobre (MACJ) 3
2025 septembre 2
2025 août 2
2025 juillet 12
Voir plus
Classe IPC
G06N 20/00 - Apprentissage automatique 45
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès 44
H04L 9/40 - Protocoles réseaux de sécurité 39
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole 33
G06N 3/08 - Méthodes d'apprentissage 27
Voir plus
Classe NICE
42 - Services scientifiques, technologiques et industriels, recherche et conception 48
36 - Services financiers, assurances et affaires immobilières 43
35 - Publicité; Affaires commerciales 28
45 - Services juridiques; services de sécurité; services personnels pour individus 18
09 - Appareils et instruments scientifiques et électriques 13
Voir plus
Statut
En Instance 59
Enregistré / En vigueur 316
  1     2     3     4        Prochaine page

1.

TECHNIQUES FOR CONTROLLING ACCESS TO COMPUTING SYSTEMS BASED ON A RISK SCORE

      
Numéro d'application 19175584
Statut En instance
Date de dépôt 2025-04-10
Date de la première publication 2025-10-16
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Totade, Sukanksha
  • Singh, Dilip Kumar

Abrégé

A system can generate a risk indicator associated with a target entity. For example, the system can receive a request for a risk indicator associated with a target entity. For each data source in a set of data sources, the system can: retrieve identity data associated with the target entity based on the identity of the target entity; and generate a set of element risk scores and a set of affiliation scores associated with each element of the set of elements. The system can determine an aggregate element risk score and an aggregate element affiliation score. The system can determine the risk indicator by combining the aggregated element risk scores of the set of elements based on a first set of element weights. The system can transmit, to a remote computing device, a responsive message including at least the risk indicator.

Classes IPC  ?

  • H04W 12/67 - Sécurité dépendant du contexte dépendant du risque, p. ex. choix du niveau de sécurité selon les profils de risque
  • H04W 12/02 - Protection de la confidentialité ou de l'anonymat, p. ex. protection des informations personnellement identifiables [PII]
  • H04W 12/08 - Sécurité d'accès

2.

TECHNIQUES FOR CONTROLLING ACCESS TO COMPUTING SYSTEMS BASED ON TRUST DETERMINED FROM IDENTITY ELEMENTS

      
Numéro d'application 19076454
Statut En instance
Date de dépôt 2025-03-11
Date de la première publication 2025-10-02
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Totade, Sukanksha
  • Singh, Dilip

Abrégé

A system can generate a trust indicator associated with a target entity. For each data source, the system can: retrieve identity data associated with the target entity based on the identity of the target entity; generate a set of element risk scores and a set of affiliation scores associated with each element of the set of elements. The system can determine an aggregate element risk score and an aggregate element affiliation score. The system can determine a risk score by combining the aggregated element risk scores based on a first set of element weights and an affiliation score by combining the aggregated element affiliation scores based on a second set of weights. The system can transmit a responsive message including at least the trust indicator in which the trust indicator is based on the risk score and the affiliation score.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

3.

REAL-TIME SERVICING OF VERIFICATION QUERIES USING HYBRID DATA SOURCES

      
Numéro d'application 19233644
Statut En instance
Date de dépôt 2025-06-10
Date de la première publication 2025-10-02
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Bertolino, Juan Martin
  • Penumacha, Sankar Rao

Abrégé

In some aspects, a verification system can receive a verification query from a verifier computing system for requesting verification of characteristics of an entity involved in an online interaction. The verification query can include a unique identifier (“UID”) of the entity. The verification computing system can query a verification repository in the verification computing system based on the UID. Additionally, the verification computing system can query an external-source cache using the UID. In response to determine a match for the UID in the external-source cache, the verification computing system can request external sensitive data records for the entity from an external source corresponding to the external-source cache. Generating consolidated sensitive data records can involve consolidating the external sensitive data records and internal sensitive data records obtained through querying the verification repository. A verification result, generated using the consolidated sensitive data records, can be transmitted to the verifier computing system.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04L 9/40 - Protocoles réseaux de sécurité

4.

SYSTEMS AND METHODS FOR AUTOMATICALLY DETERMINING CODE COMPLIANCE

      
Numéro d'application 18597505
Statut En instance
Date de dépôt 2024-03-06
Date de la première publication 2025-09-11
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Smith, Shaun
  • Skinner, Leslie
  • Merlette, Angela
  • Le, Maiha
  • Flaim, Rebecca
  • Garro, Ligia

Abrégé

In some aspects, a compliance computing system can generate an evidence repository including evidence data received via an application programming interface (API) from one or more external systems. The system can generate an evidence repository including evidence data received via an application programming interface (API) from one or more systems. The system can receive a compliance request including a compliance query, the compliance query including a requirement identifier associated with a target requirement. The system can also query the evidence repository based on the requirement identifier to retrieve the evidence data associated with the target requirement. Finally, the system can transmit, via a firewall of the compliance computing system, a response message to an external computing system, wherein the response message includes the retrieved evidence data.

Classes IPC  ?

  • G06F 11/36 - Prévention d'erreurs par analyse, par débogage ou par test de logiciel

5.

SECURE SHARING OF STORED PERSONAL INFORMATION USING DATA ENCRYPTION AND BIOMETRIC AUTHENTICATION

      
Numéro d'application US2024018860
Numéro de publication 2025/188304
Statut Délivré - en vigueur
Date de dépôt 2024-03-07
Date de publication 2025-09-11
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Singh, Satyam
  • Parekh, Dipeshkumar

Abrégé

Systems and methods for securely sharing stored personal information using data encryption and biometric authentication techniques are disclosed. In some examples, unique items of personal information of an individual may be obtained and placed in data packets. The data packets may be encrypted and may also be encoded with the identity of the individual. A chain of the encrypted data packets may be created and stored in a data repository. A request from an authorized entity for specific personal information of the individual can be received by the system, and may include consent to the request by the individual, and a private key that may be encoded with the identity of the individual. The system can validate the request, and can thereafter decrypt the encrypted data packet containing the requested personal information using the private key and provide the requested personal information to the entity.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/08 - Répartition de clés
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/00 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité

6.

EXPONENTIALLY SMOOTHED CATEGORICAL ENCODING TO CONTROL ACCESS TO A NETWORK RESOURCE

      
Numéro d'application 19206696
Statut En instance
Date de dépôt 2025-05-13
Date de la première publication 2025-08-28
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Monnig, Nathan Daniel
  • Rafla, Andrew Nader
  • Schrader, Samuel Ward

Abrégé

In an example of a method described herein, historical events occurring over a network are detected, and at least one of the historical events is associated with an observed value of a categorical variable. A numerical aggregate value representing the observed value is updated by applying an exponential smoothing function to (i) a prior numerical aggregate value representing prior historical events associated with the observed value and (ii) a count of the historical events associated with the observed value. An event occurring over the network is detected and is associated with the observed value. Features are extracted from the event, where the features include an encoded feature based on the numerical aggregate value to represent the observed value. A predictive model is applied to the features to determine a score representing likelihood of an outcome. Based on the score, access to a resource of the network is controlled.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

7.

SYSTEMS AND METHODS FOR MOBILE EMULATOR DETECTION

      
Numéro d'application US2024016036
Numéro de publication 2025/174374
Statut Délivré - en vigueur
Date de dépôt 2024-02-15
Date de publication 2025-08-21
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Galli, Christopher John
  • Gangurde, Rohit

Abrégé

A method described herein involves various operations directed toward network security. The operations include receiving a request for a risk indicator of a target entity. The risk indicator can indicate a level of risk associated with the target entity based on whether the target entity is associated with a mobile device emulator. The operations include generating the risk indicator by applying the entity data to an emulator detection model trained on a training dataset comprising a corpus of attribute data and interaction data. Finally, the operations include providing, to a remote computing device, a responsive message comprising at least the risk indicator to control access to an interactive computing environment.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

8.

RISK ASSESSMENT TECHNIQUES FOR CONTROLLING ACCESS TO COMPUTING SYSTEMS BASED ON EVENT ANALYSIS

      
Numéro d'application US2024012600
Numéro de publication 2025/159743
Statut Délivré - en vigueur
Date de dépôt 2024-01-23
Date de publication 2025-07-31
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Totade, Sukanksha
  • Singh, Dilip

Abrégé

A system can generate a risk assessment associated with a target entity. For example, the system can receive a request for a risk indicator associated with a target entity. The system can determine that a data source contains a name associated with the target entity based on extracted text from the data source. The system can identify a sentence containing the name. The system can further determine a sentiment score for the sentence. The system can generate a classification associated with an event included in the sentence. The system can determine a confidence score that the name in the extracted text is associated with the target entity based on attributes associated with the name in the extracted text. The system can transmit, to a remote computing device, a message including the risk indicator based on the classification or sentiment score.

Classes IPC  ?

  • G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
  • G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
  • G06F 16/33 - Requêtes
  • G06F 40/295 - Reconnaissance de noms propres
  • G06F 40/30 - Analyse sémantique

9.

FLEXIBLE RISK ASSESSMENT TECHNIQUES FOR CONTROLLING ACCESS TO COMPUTING SYSTEMS

      
Numéro d'application US2024011627
Numéro de publication 2025/155280
Statut Délivré - en vigueur
Date de dépôt 2024-01-16
Date de publication 2025-07-24
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Totade, Sukanksha
  • Singh, Dilip

Abrégé

A system can generate a risk assessment associated with a target entity. For example, the system can receive a request for a risk indicator associated with a target entity. For each data source in a set of data sources, the system can: retrieve identity data associated with the target entity based on the identity of the target entity; and generate a set of element scores associated with each element of the set of elements. The system can determine an aggregate element score by combining the data source-level element scores for the set of data sources. The system can determine the risk indicator by combining the aggregated element scores of the set of elements based on a set of element weights. The system can also transmit, to a remote computing device, a responsive message including at least the risk indicator.

Classes IPC  ?

  • G06N 7/01 - Modèles graphiques probabilistes, p. ex. réseaux probabilistes
  • G06N 20/00 - Apprentissage automatique

10.

CREATING PREDICTOR VARIABLES FOR PREDICTION MODELS FROM UNSTRUCTURED DATA USING NATURAL LANGUAGE PROCESSING

      
Numéro d'application 19069813
Statut En instance
Date de dépôt 2025-03-04
Date de la première publication 2025-07-17
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Hamilton, Howard Hugh
  • Woodford, Terry

Abrégé

Systems and methods for creating predictor variables from unstructured data for prediction models are provided. A variable creation application receives unstructured data and processing the unstructured data to generate processed data. Based on the processed data, the variable creation application generates an attribute pool that contains multiple predictor variables generated by applying natural language processing (NLP) procedures on the processed data. The variable creation application further executes a prediction model on at least the predictor variables in the attribute pool to generate a prediction result. Based on the prediction result, the variable creation application evaluates the predictive power of each of the predictor variables and retains predictor variables that are predictive as input predictor variables for the prediction model.

Classes IPC  ?

  • G06F 40/40 - Traitement ou traduction du langage naturel
  • G06F 40/284 - Analyse lexicale, p. ex. segmentation en unités ou cooccurrence
  • G06F 40/295 - Reconnaissance de noms propres

11.

AUTOMATED PATH-BASED RECOMMENDATION FOR RISK MITIGATION

      
Numéro d'application 19097358
Statut En instance
Date de dépôt 2025-04-01
Date de la première publication 2025-07-17
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Miller, Stephen
  • Jordan, Lewis
  • Turner, Matthew
  • Day, Mark
  • Joshua, Allan

Abrégé

Systems and methods for automated path-based recommendation for risk mitigation are provided. An entity assessment server, responsive to a request for a recommendation for modifying a current risk assessment score of an entity to a target risk assessment score, accesses an input attribute vector for the entity and clusters of entities defined by historical attribute vectors. The entity assessment server assigns the input attribute vector to a particular cluster and determines a requirement on movement from a first point to a second point in a multi-dimensional space based on the statistics computed from the particular cluster. The first point corresponds to the current risk assessment score and the second point corresponds to the target risk assessment score. The entity assessment server computes an attribute-change vector so that a path defined by the attribute-change vector complies with the requirement and generates the recommendation from the attribute-change vector.

Classes IPC  ?

  • G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
  • G06Q 40/03 - CréditsPrêtsLeur traitement

12.

SECURE RESOURCE MANAGEMENT TO PREVENT FRAUDULENT RESOURCE ACCESS

      
Numéro d'application 19170551
Statut En instance
Date de dépôt 2025-04-04
Date de la première publication 2025-07-17
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Bondugula, Rajkumar
  • Mcburnett, Michael

Abrégé

Systems and methods for secure resource management are provided. A secure resource management system includes a resource record repository, such as a secure database or a blockchain, for storing resource records for resources. The resource records contain information of resource providers, information of resource users having a right to obtain resources, and resource transaction histories. Responsive to a request to verify an authorized user of a resource, the secure resource management system further queries the resource record repository, retrieves the resource record, determines the resource user currently having a right to obtain the resource as the authorized user of the resource, and transmits the verification result in response to the request. The verification result identifies the authorized user of the resource and can be used to grant access to the resource by the authorized user.

Classes IPC  ?

13.

MACHINE-LEARNING TECHNIQUES OF USING TABULARIZED DATA TO PREDICT MISSING VALUES

      
Numéro d'application US2025010304
Numéro de publication 2025/151343
Statut Délivré - en vigueur
Date de dépôt 2025-01-03
Date de publication 2025-07-17
Propriétaire EQUIFAX INC. (USA)
Inventeur(s) Shafiei, Ella

Abrégé

In some aspects, a computing system can train a machine learning (ML) model for risk assessment using risk assessment training data generated at least in part by a prediction model. Once trained, the ML model can determine a risk indicator for a target entity that indicates a level of risk associated with the target entity. Training the ML model can involve receiving a request to predict a value of an unknown segment of a transaction record used to train the ML model. The computing system can execute the prediction model to predict the value of the unknown segment prior to training the ML model using the transaction record that includes the predicted value generated by the prediction model. Additionally, the computing system can generate explanatory data for the target entity indicating relationships between changes in the risk indicator and changes in the transaction records associated with the target entity.

Classes IPC  ?

14.

CONFIRMING AUTHENTICITY OF A USER TO A THIRD-PARTY SYSTEM

      
Numéro d'application 19086796
Statut En instance
Date de dépôt 2025-03-21
Date de la première publication 2025-07-03
Propriétaire
  • EQUIFAX, INC. (USA)
  • FIDELITY INFORMATION SERVICES, LLC (USA)
Inventeur(s)
  • Cano, Helcio
  • Huffman, Rich
  • Bijlani, Ravindra
  • Michaelson, Richard
  • Harris, Rob
  • Van Zyl, Vivian
  • Pigg, Esther
  • Romain, Marty

Abrégé

A telecommunications network server system provides a digital identifier to a user device. The digital identifier may include identification data corresponding to a user of the user device. In addition, the telecommunications network server system receives, from one or more third-party systems, requests to authenticate the user for an electronic transaction with the respective third-party system. The telecommunications network server system provides a unique electronic transaction code to each third-party system. Responsive to receiving from the user device one of the unique electronic transaction codes, the telecommunications network server system provides, to the respective third-party system, authentication of the user.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 67/306 - Profils des utilisateurs
  • H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services
  • H04W 12/06 - Authentification

15.

RISK ASSESSMENT FOR PERSONALLY IDENTIFIABLE INFORMATION ASSOCIATED WITH CONTROLLING INTERACTIONS BETWEEN COMPUTING SYSTEMS

      
Numéro d'application 18400210
Statut En instance
Date de dépôt 2023-12-29
Date de la première publication 2025-07-03
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Madarshahian, Ramin
  • Jones, Matthew
  • Gangurde, Rohit
  • Johnston, Joshua

Abrégé

A system can generate a risk assessment associated with an identity element used in interactions associated with a user entity. For example, the system can receive historical data related an identity element associated with a user entity, the identity element used in a set of interactions associated with the user entity. The system can generate a binomial distribution of the historical data associated with the identity element. The system can determine, based at least in part on the binomial distribution of the historical data, a risk indicator associated with the identity element. The system can control, based at least in part on the risk indicator associated with the identity element, an interaction involving a target entity and the user entity using the identity element.

Classes IPC  ?

16.

MACHINE-LEARNING TECHNIQUES WITH LARGE GRAPHS

      
Numéro d'application US2024061747
Numéro de publication 2025/144811
Statut Délivré - en vigueur
Date de dépôt 2024-12-23
Date de publication 2025-07-03
Propriétaire EQUIFAX INC. (USA)
Inventeur(s) Shafiei, Ella

Abrégé

A method includes determining, using a trained machine-learning model, a risk indicator for a target entity from predictor variables associated with the target entity. The machine-learning model is trained based on a bi-partite similarity graph comprising a first set of nodes and a second set of nodes, where a first set of edges connects the first set of nodes and represents similarities between the nodes of the first set of nodes, a second set of edges connects the first set of nodes to the second set of nodes and represents relationships between the respective connected nodes, and a third set of edges connects the second set of nodes and represents similarities between the connected nodes of the second set of nodes. The method further includes generating and transmitting a responsive message comprising the risk indicator to control access of the target entity to a computing environment.

Classes IPC  ?

  • G06N 3/045 - Combinaisons de réseaux
  • G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage
  • G06N 5/022 - Ingénierie de la connaissanceAcquisition de la connaissance

17.

ARTIFICIAL INTELLIGENCE MODEL FOR CONTROLLING INTERACTION DISPUTE

      
Numéro d'application US2024061843
Numéro de publication 2025/144846
Statut Délivré - en vigueur
Date de dépôt 2024-12-24
Date de publication 2025-07-03
Propriétaire EQUIFAX, INC. (USA)
Inventeur(s)
  • Shen, Cuizhen
  • Harrison, Brady
  • Ranganathan, Arunkumar
  • Acquaviva, Jenna
  • Rickman, Anna

Abrégé

A system can be used to provide a responsive message for controlling an interaction dispute. The system can receive tokens from an optical character recognition model. The set of tokens can represent at least evidence data relating to an interaction dispute. The system can determine, using an artificial intelligence model, a first likelihood that represents a similarity between a subset of the tokens and the interaction dispute. The system can determine a second likelihood that traversing to the interaction dispute may result in success. The system can provide the responsive message that can control the interaction dispute based on the first likelihood and the second likelihood. The responsive message can include a response to the interaction dispute.

Classes IPC  ?

18.

ARTIFICIAL INTELLIGENCE MODEL FOR FACILITATING REVERSED INTERACTION

      
Numéro d'application US2023086436
Numéro de publication 2025/144417
Statut Délivré - en vigueur
Date de dépôt 2023-12-29
Date de publication 2025-07-03
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Shen, Cuizhen
  • Harrison, Brady
  • Eldred, Andrew
  • Lim, Daniel
  • Ranganathan, Arunkumar
  • Tennyson, Christopher
  • Schrader, Samuel

Abrégé

A system can be used to control reversal of an interaction. The system can receive a request to reverse a previously executed interaction. The request can include data relating to a previously executed interaction that may be associated with a. target entity. The system can generate, using an artificial intelligence model that includes a generative artificial intelligence model, risk signals based on the request and the data. The system can determine, based on the risk signals, a risk indicator that represents a. likelihood that the request may be illegitimate. The system can provide a responsive message to control reversal of the previously executed interaction and based on the risk indicator.

Classes IPC  ?

  • G06Q 30/018 - Certification d’entreprises ou de produits
  • G06Q 30/0207 - Remises ou incitations, p. ex. coupons ou rabais

19.

MACHINE-LEARNING TECHNIQUES WITH LARGE GRAPHS

      
Numéro d'application US2024061744
Numéro de publication 2025/144808
Statut Délivré - en vigueur
Date de dépôt 2024-12-23
Date de publication 2025-07-03
Propriétaire EQUIFAX INC. (USA)
Inventeur(s) Shafiei, Ella

Abrégé

A computing system can generate and train a machine-learning model for risk assessment. The machine-learning model can be trained on semi-labelled graph data that may contain one or more isolated nodes generated from a tabularized data set. The computing system can use graph embeddings to compare pairs of nodes of the graph to determine a similarity between each pair of nodes. The similarity may be used to determine whether to create a synthetic edge between the pair of nodes. An additional hyperparameter may be used to tune the number of generated edges based on a desired graph density. The generated graph data may then be used to train a machine-learning model capable of generating a risk indicator for a target entity. Further, the risk indicators can be utilized to control the access by a target entity to an interactive computing environment for accessing services provided by one or more institutions.

Classes IPC  ?

  • G06N 3/045 - Combinaisons de réseaux
  • G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage
  • G06N 5/022 - Ingénierie de la connaissanceAcquisition de la connaissance

20.

LOCK & ALERT

      
Numéro de série 99264499
Statut En instance
Date de dépôt 2025-07-02
Propriétaire Equifax Inc. ()
Classes de Nice  ?
  • 09 - Appareils et instruments scientifiques et électriques
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Computer software application for mobile devices, namely, computer software for monitoring, managing, and identifying changes in and risks to information relating to personal credit, fraud, and identity theft Providing temporary use of non-downloadable software for monitoring, managing, and identifying changes in and risks to information relating to personal credit, fraud, and identity theft

21.

ARTIFICIAL INTELLIGENCE MODEL FOR CONTROLLING INTERACTION DISPUTE

      
Numéro d'application 18396230
Statut En instance
Date de dépôt 2023-12-26
Date de la première publication 2025-06-26
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Shen, Cuizhen
  • Harrison, Brady
  • Ranganathan, Arunkumar
  • Acquaviva, Jenna
  • Rickman, Anna

Abrégé

A system can be used to provide a responsive message for controlling an interaction dispute. The system can receive tokens from an optical character recognition model. The set of tokens can represent at least evidence data relating to an interaction dispute. The system can determine, using an artificial intelligence model, a first likelihood that represents a similarity between a subset of the tokens and the interaction dispute. The system can determine a second likelihood that traversing to the interaction dispute may result in success. The system can provide the responsive message that can control the interaction dispute based on the first likelihood and the second likelihood. The responsive message can include a response to the interaction dispute.

Classes IPC  ?

  • G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
  • G06F 40/284 - Analyse lexicale, p. ex. segmentation en unités ou cooccurrence
  • G06N 3/0455 - Réseaux auto-encodeursRéseaux encodeurs-décodeurs
  • G06V 30/10 - Reconnaissance de caractères

22.

DEVICE-AGNOSTIC ACCESS CONTROL TECHNIQUES

      
Numéro d'application 19059024
Statut En instance
Date de dépôt 2025-02-20
Date de la première publication 2025-06-12
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Singh, Dilip
  • Keller, Gary
  • Beatty, Robert
  • Tirunellayi, Sriram

Abrégé

A system can efficiently control access to an interactive computing environment. The system can receive authentication data of an authentication attempt associated with an entity. The system can determine, for the entity, a historical vector including features that include sub-features. The historical vector can be determined by generating synthetic data, generating weights, and determining probabilities. The synthetic data can be based on historical authentication attempts by entities other than the entity. The weights can correspond to sub-features of the historical vector. The probabilities can indicate a likelihood that a corresponding sub-feature is involved in the authentication attempt. The system can compare the historical vector to the authentication data. The system can generate a responsive message based on the comparison for controlling access to the interactive computing environment.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 18/214 - Génération de motifs d'entraînementProcédés de Bootstrapping, p. ex. ”bagging” ou ”boosting”

23.

HISTORICAL RISK ASSESSMENT FOR RISK MITIGATION IN ONLINE ACCESS CONTROL

      
Numéro d'application 19059907
Statut En instance
Date de dépôt 2025-02-21
Date de la première publication 2025-06-12
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Alam, Md Shafiul
  • Boardman, Jonathan
  • Huang, Xiao
  • Dugger, Jeffery
  • Turner, Matthew

Abrégé

Systems and methods for automated historical risk assessment for risk mitigation in online access control are provided. An entity assessment server can receive a request to assess a risk indicator change from a first risk indicator to a second risk indicator. For each attribute used to generate the first risk indicator and second risk indicator, a first impact can be determined for changing from the first risk indicator to a third risk indicator between the first risk indicator and the second risk indicator. A second impact similarly can be determined for changing from the third risk indicator to the second risk indicator. Aggregating the first impact and the second impact can determine a total impact of each attribute. Assessment results can be generated to include a list of attributes ordered according to the respective total impact and transmitted to a remote computing device for use in improving the risk indicator.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

24.

ENHANCED RANK-ORDER FOR RISK ASSESSMENT USING PARAMETERIZED DECAY

      
Numéro d'application US2024055130
Numéro de publication 2025/101903
Statut Délivré - en vigueur
Date de dépôt 2024-11-08
Date de publication 2025-05-15
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Lv, Ling
  • Bargo, Ana
  • Singh, Dilip

Abrégé

A system can receive data about a target entity. The system can identify, for each data point included in the data, a set of parameters. The system can generate, based at least in part on the set of parameters, a rank-order list that includes the data. The rank-order list can be generated by a parameterized decay model. The system can provide the rank-order list to a user entity to control an interaction between the target entity and the user entity.

Classes IPC  ?

  • G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
  • G06F 21/60 - Protection de données

25.

SYSTEM AND METHODS FOR FAIRNESS EVALUATION IN MODELLED SYSTEMS

      
Numéro d'application US2024049777
Numéro de publication 2025/076211
Statut Délivré - en vigueur
Date de dépôt 2024-10-03
Date de publication 2025-04-10
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Mcburnett, Michael
  • Grundlingh, Nina
  • Boardman, Jonathan
  • Biswas, Sanad
  • White, Joseph
  • Le, Linh

Abrégé

In one example, a method includes building a first model including a first data set, the first data set excluding protected class. A second model is built including a second data set, the second data set including a subset of the first data set. The models may be used to generate and index score distributions. The distributions are compared to determine a self-report correlation. In response to determining the aggregate correlation is less than the first disparate impact threshold, the method generates a first prediction of disparate impact. The method then generates an aggregate correlation for attributes in the first model with the self-reported protected class attribute, the plurality of attributes being generated by the first model. In response to determining the aggregate correlation exceeds the second disparate impact threshold, the method generates a second prediction of disparate impact.

Classes IPC  ?

  • G06F 16/906 - GroupementClassement
  • G06N 3/00 - Agencements informatiques fondés sur des modèles biologiques

26.

THIRD-PARTY ACCESS-CONTROL SUPPORT USING ROLE HISTORY ANALYSIS

      
Numéro d'application 18918521
Statut En instance
Date de dépôt 2024-10-17
Date de la première publication 2025-04-10
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Alden, John
  • Johnson, Janice
  • Wagner, Jeffrey

Abrégé

Various aspects of the present disclosure involve computing environments that provide third-party access-control support. For instance, an access-control computing system can access a secure identity repository having role history data from various contributor computing systems. The access-control computing system can compare an identified set of roles with a set of roles described by role history data for a target entity. The access-control computing system can determine, from the comparison, whether the target entity poses a security risk based on inconsistencies between the sets of roles, durations associated with the roles, or both. The access-control computing system can provide a client computing system with a dynamic access-control data structure that is generated based on the comparison. The dynamic access-control data structure allows the client computing system to output the security assessment to an end user or to otherwise facilitate further security measures with respect to the target entity.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 9/46 - Dispositions pour la multiprogrammation
  • H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente

27.

SYSTEM AND METHOD FOR CONTROLLING ACCESS TO A RESOURCE BASED ON A COMPLIANCE SCORE

      
Numéro d'application 18882096
Statut En instance
Date de dépôt 2024-09-11
Date de la première publication 2025-03-13
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Gonzalez-Rocha, Tomas
  • Morgan, Christina

Abrégé

A system can generate one or more compliance graphs and a compliance score that can be used at least in risk assessment operations. The system can access a request to visualize target entity data and calculate a compliance score for the target entity. The system can access attribute data. The system can generate one or more compliance graphs and a compliance score using the attribute data. The system can compare the compliance score to a compliance threshold and transmit a message including the results of the comparison to a remote system for controlling access of the target entity to an interactive computing environment.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
  • H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]

28.

DATA VALIDATION TECHNIQUES FOR SENSITIVE DATA MIGRATION ACROSS MULTIPLE PLATFORMS

      
Numéro d'application 18950422
Statut En instance
Date de dépôt 2024-11-18
Date de la première publication 2025-03-06
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Singh, Rohit
  • Ghosh, Pinaki
  • Varughese, Joji

Abrégé

Techniques for validating large amounts of sensitive data migrated across multiple platforms without revealing the content of the sensitive data are provided. For example, a processing device can transform data in a first data file stored on a first platform to common data formats. The processing device can generate a first set of hash values. The processing device can receive a second set of hash values for a second data file stored on a second platform. The processing device can compare the first set of hash values and the second set of hash values and cause the first data file or the second data file to be modified based on a difference between the sets of hash values.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • H04L 67/06 - Protocoles spécialement adaptés au transfert de fichiers, p. ex. protocole de transfert de fichier [FTP]
  • H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]

29.

ARTIFICIAL INTELLIGENCE TECHNIQUES FOR IDENTIFYING IDENTITY MANIPULATION

      
Numéro d'application 18460415
Statut En instance
Date de dépôt 2023-09-01
Date de la première publication 2025-03-06
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Shen, Cuizhen
  • Ranganathan, Arunkumar
  • Lim, Daniel
  • Munguia, Philip

Abrégé

A system can efficiently determine whether an identity is manipulated. The system can receive entity data and interaction data associated with a target entity. The system can determine, based on the entity data and the interaction data, one or more risk signals associated with the target entity using one or more artificial intelligence models. The system can generate a linked graph structure based on a first graph structure and a second graph structure each generated using the entity data and the interaction data. The system can apply the one or more risk signals to the linked graph structure to determine a risk indicator associated with the target entity. The system can provide a responsive message based on the risk indicator. The responsive message can be used to control access of the target entity to an interactive computing environment.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

30.

ARTIFICIAL INTELLIGENCE TECHNIQUES FOR IDENTIFYING IDENTITY MANIPULATION

      
Numéro d'application US2024042496
Numéro de publication 2025/049120
Statut Délivré - en vigueur
Date de dépôt 2024-08-15
Date de publication 2025-03-06
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Shen, Cuizhen
  • Ranganathan, Arunkumar
  • Lim, Daniel
  • Munguia, Philip

Abrégé

A system can efficiently determine whether an identity is manipulated. The system can receive entity data and interaction data associated with a target entity. The system can determine, based on the entity data and the interaction data, one or more risk signals associated with the target entity using one or more artificial intelligence models. The system can generate a linked graph structure based on a first graph structure and a second graph structure each generated using the entity data and the interaction data. The system can apply the one or more risk signals to the linked graph structure to determine a risk indicator associated with the target entity. The system can provide a responsive message based on the risk indicator. The responsive message can be used to control access of the target entity to an interactive computing environment.

Classes IPC  ?

  • G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
  • G06Q 40/03 - CréditsPrêtsLeur traitement
  • G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage
  • G06N 20/00 - Apprentissage automatique

31.

TRAINING OR USING SETS OF EXPLAINABLE MACHINE-LEARNING MODELING ALGORITHMS FOR PREDICTING TIMING OF EVENTS

      
Numéro d'application 18943405
Statut En instance
Date de dépôt 2024-11-11
Date de la première publication 2025-02-27
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Dugger, Jeffery
  • Mcburnett, Michael

Abrégé

Certain aspects involve building timing-prediction models for predicting timing of events that can impact one or more operations of machine-implemented environments. For instance, a computing system can generate program code executable by a host system for modifying host system operations based on the timing of a target event. The program code, when executed, can cause processing hardware to a compute set of probabilities for the target event by applying a set of trained timing-prediction models to predictor variable data. A time of the target event can be computed from the set of probabilities. To generate the program code, the computing system can build the set of timing-prediction models from training data. Building each timing-prediction model can include training the timing-prediction model to predict one or more target events for a different time bin within the training window. The computing system can generate and output program code implementing the models' functionality.

Classes IPC  ?

  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06N 7/01 - Modèles graphiques probabilistes, p. ex. réseaux probabilistes
  • G06N 20/20 - Techniques d’ensemble en apprentissage automatique
  • H04L 41/14 - Analyse ou conception de réseau
  • H04L 67/01 - Protocoles

32.

EXPLAINABLE MACHINE LEARNING BASED ON WAVELET ANALYSIS

      
Numéro d'application 18719076
Statut En instance
Date de dépôt 2022-12-16
Date de la première publication 2025-02-27
Propriétaire EQUIFAX INC. (USA)
Inventeur(s) Dugger, Jeffery

Abrégé

A method can be used to predict risk and provide explainable outcomes using machine learning based on wavelet analysis. A risk prediction model can be applied to time-series data for an attribute associated with a target entity to generate a risk indicator for the target entity. The risk prediction model can include a feature learning model and a risk classification model configured to generate the risk indicator as output. Parameters of the feature learning model can be accessed and a plurality of basis functions of a wavelet transformation can be applied on the parameters of the feature learning model to generate a set of parameter wavelet coefficients. Explanatory data can be generated for the risk indicator based on the set of parameter wavelet coefficients. A responsive message can be transmitted to a remote computing device including the risk indicator and the explanatory data for use in controlling access of the target entity to an interactive computing environment.

Classes IPC  ?

33.

SYSTEM AND METHOD FOR CONTROLLING RESOURCE MANAGEMENT USING MACHINE LEARNING

      
Numéro d'application US2024042696
Numéro de publication 2025/042741
Statut Délivré - en vigueur
Date de dépôt 2024-08-16
Date de publication 2025-02-27
Propriétaire EQUIFAX INC. (USA)
Inventeur(s) Du Preez, Warren

Abrégé

In some aspects, a computing system can use a machine learning model for resource management. For example, the system can receive a request for a set of steps associated with a target model output of a machine learning model. The request can include a starting input feature set and a number of steps. For each of the number of steps, the system can calculate a change to one or more features from the starting input feature set to arrive at the target model output based on a current position in feature space of the machine learning model. The system can update a feature vector by applying the change to the features of the starting input feature set and transmitting the set of steps. The system can then cause a resource of the external computing system to transition toward a position defined by the target model output.

Classes IPC  ?

  • G06N 20/00 - Apprentissage automatique
  • G06N 5/01 - Techniques de recherche dynamiqueHeuristiquesArbres dynamiquesSéparation et évaluation

34.

FRAUDIQ

      
Numéro d'application 238233000
Statut En instance
Date de dépôt 2025-02-26
Propriétaire Equifax Inc. (USA)
Classes de Nice  ?
  • 36 - Services financiers, assurances et affaires immobilières
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception
  • 45 - Services juridiques; services de sécurité; services personnels pour individus

Produits et services

(1) Consulting services in the field of life, health, property and casualty insurance; consulting services in the field of account origination and portfolio management; credit information services, namely, providing credit information relating to consumer or commercial applicants for credit, mortgage loans, utility services and employment and to fraud prevention; providing credit application processing; credit inquiry and consulting services; real estate appraisal services; providing an on-line credit information database featuring information relating to insurance, credit, financial data, mortgage loans, and employment, and to debt servicing; credit evaluation, analysis and alert services; and providing information relating to insurance, credit, mortgage loans and debt management; and excluding foreign exchange services and money market trading services. (2) Providing non-downloadable software for risk analysis, identity verification, data analysis, risk modelling and analytics, decision making and analysis, in the field of fraud protection. (3) Providing information over the Internet in the fields of identity verification and fraud protection; providing credit and financial fraud detection services.

35.

MACHINE-LEARNING TECHNIQUES FOR PREDICTING UNOBSERVABLE OUTPUTS

      
Numéro d'application US2024036496
Numéro de publication 2025/034318
Statut Délivré - en vigueur
Date de dépôt 2024-07-02
Date de publication 2025-02-13
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Miller, Stephen
  • Jordan, Lewis
  • Rosales, Felipe Alfonso Avila
  • Woodford, Terry
  • Turner, Matthew

Abrégé

In some aspects, a computing system can generate and optimize a machine learning model to estimate an unobservable capacity of a target system or entity. The computing system can access training vectors which include training predictor variables, training performance indicators, and task quantities. A training performance indicator indicating performance outcome corresponding to the predictor variables and a task quantity associated with a task assigned to the target entity that leads to the training performance indicator. The machine learning model can be trained by performing adjustments of parameters of the machine learning model to minimize a loss function defined based on the training vectors. The trained machine learning model can be used to estimate the capacity of the target system or entity for handling tasks and be used in assigning tasks to the target entity according to the determined capacity.

Classes IPC  ?

  • G06N 3/048 - Fonctions d’activation
  • G06N 3/09 - Apprentissage supervisé
  • G06N 3/0985 - Optimisation d’hyperparamètresMeta-apprentissageApprendre à apprendre
  • G06N 5/01 - Techniques de recherche dynamiqueHeuristiquesArbres dynamiquesSéparation et évaluation
  • G06N 20/20 - Techniques d’ensemble en apprentissage automatique

36.

MACHINE-LEARNING TECHNIQUES FOR PREDICTING UNOBSERVABLE OUTPUTS

      
Numéro d'application 18446246
Statut En instance
Date de dépôt 2023-08-08
Date de la première publication 2025-02-13
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Miller, Stephen
  • Jordan, Lewis
  • Rosales, Felipe Alfonso Avila
  • Woodford, Terry
  • Turner, Matthew

Abrégé

In some aspects, a computing system can generate and optimize a machine learning model to estimate an unobservable capacity of a target system or entity. The computing system can access training vectors which include training predictor variables, training performance indicators, and task quantities. A training performance indicator indicating performance outcome corresponding to the predictor variables and a task quantity associated with a task assigned to the target entity that leads to the training performance indicator. The machine learning model can be trained by performing adjustments of parameters of the machine learning model to minimize a loss function defined based on the training vectors. The trained machine learning model can be used to estimate the capacity of the target system or entity for handling tasks and be used in assigning tasks to the target entity according to the determined capacity.

Classes IPC  ?

37.

CONSTRAINED NON-LINEAR HYBRID MODELS FOR PREDICTION FROM MULTIPLE DATA SOURCES

      
Numéro d'application US2024041292
Numéro de publication 2025/034862
Statut Délivré - en vigueur
Date de dépôt 2024-08-07
Date de publication 2025-02-13
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Miller, Stephen
  • Rosales, Felipe Alfonso Avila
  • Jordan, Lewis
  • Kwiatkowski, Grzegorz
  • Turner, Matthew

Abrégé

In some aspects, a machine learning (ML) model can be trained for risk assessment. The ML model can be trained to determine a risk indicator for a target entity from predictor variables associated with the target entity. The predictor variables are obtained from multiple sources with varying availability, and the training of the ML model is accomplished based on a multi-dimensional representation of common information from the set of data sources. Once generated, the risk indicator can be transmitted to a remote computing device in a responsive message for use in controlling access of the target entity to a computing environment.

Classes IPC  ?

  • G06N 3/045 - Combinaisons de réseaux
  • G06N 20/00 - Apprentissage automatique
  • G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
  • G06N 5/045 - Explication d’inférenceIntelligence artificielle explicable [XAI]Intelligence artificielle interprétable

38.

CONTROLLING ACCESS USING A RISK INDICATOR GENERATED WITH ALTERNATIVE DATA

      
Numéro d'application US2024041759
Numéro de publication 2025/035116
Statut Délivré - en vigueur
Date de dépôt 2024-08-09
Date de publication 2025-02-13
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • White, Joseph
  • Rosales, Felipe Alfonso Avila
  • Jordan, Lewis
  • Varughese, Joji
  • Turner, Matthew
  • Hamilton, Howard
  • Liu, Jiawei

Abrégé

In some aspects, a computing system can train a machine learning model for risk assessment. For example, the system can access a trained machine learning model to determine a final risk indicator of a target entity from a baseline data associated with the target entity and an alternative data associated with the target entity. The computing system can generate the final risk indicator of the target entity using the baseline data associated with the target entity and the alternative data associated with the target entity. The computing system can also transmit, to a remote computing device, a responsive message comprising at least the final risk indicator for use in controlling access of the target entity to one or more computing environments.

Classes IPC  ?

39.

EXPLAINABLE MACHINE LEARNING BASED ON TIME-SERIES TRANSFORMATION

      
Numéro d'application 18717263
Statut En instance
Date de dépôt 2021-12-08
Date de la première publication 2025-02-06
Propriétaire EQUIFAX INC. (USA)
Inventeur(s) Miller, Stephen

Abrégé

Various aspects involve explainable machine learning based on time-series transformation. For instance, a computing system accesses time-series data of a predictor variable associated with a target entity. The computing system generates a first set of transformed time-series data instances by applying a first family of transformations on the time-series data. Any non-negative linear combination of the first family of transformations forms an interpretable transformation of the time-series data. The computing system determines a risk indicator for the target entity indicating a level of risk associated with the target entity by inputting the first set of transformed time-series data instances into a machine learning model. The computing system transmits, to a remote computing device, a responsive message including the risk indicator. The risk indicator is usable for controlling access to one or more interactive computing environments by the target entity.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 17/40 - Acquisition et consignation de données

40.

SIMILARITY HASHING FOR ACCESS CONTROL

      
Numéro d'application 18365781
Statut En instance
Date de dépôt 2023-08-04
Date de la première publication 2025-02-06
Propriétaire EQUIFAX INC. (USA)
Inventeur(s) Monnig, Nathan Daniel

Abrégé

A system can efficiently control access to an interactive computing environment using similarity hashing. The system can receive a first similarity-preserving hash based on an interaction request associated with a target entity for requesting access to an interactive computing environment. The system can receive a second similarity-preserving hash based on entity data relating to an entity and including interaction data. The system can determine, based on a comparison between the first similarity-preserving hash and the second similarity-preserving hash, a likelihood that the interaction request is legitimate. The system can provide a responsive message based on a threshold relating to the likelihood, the responsive message usable to control access to the interactive computing environment.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 21/60 - Protection de données
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

41.

TECHNIQUES FOR MITIGATING BACK PRESSURE, AUTO-SCALING THROUGHPUT, AND CONCURRENCY SCALING IN LARGE-SCALE AUTOMATED EVENT-DRIVEN DATA PIPELINES

      
Numéro d'application 18348970
Statut En instance
Date de dépôt 2023-07-07
Date de la première publication 2025-01-09
Propriétaire EQUIFAX INC. (USA)
Inventeur(s) Smith, Michael

Abrégé

Systems and methods for fine-tuned control over data transfer processes. An exemplary data transfer process may include: receiving a data stream at a storage service; receiving, at a first function, one or more notifications; in response to each notification, passing, by the first function, a message to a queue, the message comprising an address of a respective file within the storage service; receiving, at an invocation of a second function at a second computing service, one or more messages from the queue; retrieving, by the second function, data from one or more files based on the address in each of the one or more messages; and writing, by the second function, the data to a database. Systems and methods according to aspects of the present disclosure improve processes of transferring data from a data warehouse or database to a cloud-based database by mitigating back-pressure, auto-scaling throughput, and controlling concurrency scaling.

Classes IPC  ?

42.

Temporal identity graph

      
Numéro d'application 18470150
Numéro de brevet 12189689
Statut Délivré - en vigueur
Date de dépôt 2023-09-19
Date de la première publication 2025-01-07
Date d'octroi 2025-01-07
Propriétaire Equifax Inc. (USA)
Inventeur(s) Monnig, Nathan Daniel

Abrégé

A system can generate an identity graph that can be arranged temporally for use at least in risk assessment operations and similar analyses. The system can receive a request to visualize entity data. The system can receive the entity data, which can include a set of identity data and a set of interaction data. The system can generate a temporal identity graph using the entity data. The temporal identity graph can temporally link the identity of the entity with the interactions associated with the entity. The system can generate a graphical user interface that may be configured to provide the temporal identity graph in response to the request to visualize the entity data. The graphical user interface can include interactive elements representing the temporal identity graph. Each interactive element can be selected by a user of the graphical user interface to display previously non-displayed information.

Classes IPC  ?

  • G06F 16/90 - Détails des fonctions des bases de données indépendantes des types de données cherchés
  • G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage
  • G06F 16/904 - NavigationVisualisation à cet effet

43.

TECHNIQUES FOR AUTOMATICALLY CONTROLLING ACCESS TO SECURED RESOURCES

      
Numéro d'application 18743702
Statut En instance
Date de dépôt 2024-06-14
Date de la première publication 2024-12-19
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Gold, Jamie
  • Mckeown, Sean
  • Gates, William
  • Wright, Ian

Abrégé

A system can generate a risk assessment associated with a target entity. The system can determine an attribute tier for each entity in a set of entities. For each attribute tier, the system can: generate a model configured to predict a percent change in the attribute over a time period for each entity in the respective attribute tier; determine the percent change in the attribute for each entity in the respective attribute tier using the model associated with the respective attribute tier; rank each entity in the attribute tier based on the predicted percent change in the attribute; and assign a score to each entity in the attribute tier based on the rank of the respective entity and on a preconfigured distribution. The system can determine a risk indicator based, in part, on the score.

Classes IPC  ?

  • G06Q 40/03 - CréditsPrêtsLeur traitement
  • G06Q 30/0201 - Modélisation du marchéAnalyse du marchéCollecte de données du marché

44.

FRAGMENTED RECORD DETECTION BASED ON RECORDS MATCHING TECHNIQUES

      
Numéro d'application 18700797
Statut En instance
Date de dépôt 2021-10-13
Date de la première publication 2024-12-19
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Sivaraj, Sunit
  • Cyzio, Marek
  • Patel, Piyush
  • King, Michele
  • Bondugula, Rajkumar

Abrégé

In some aspects, a record-matching computing system for detecting fragmented records is provided. The record-matching system is configured to identify a list of candidate records for merging from a set of data records. The record-matching system determines a matching decision for each pair of candidate records in the list and generates a graph. The graph includes nodes representing respective candidate records and edges connecting the nodes. Each edge represents a match between a pair of nodes connected by the edge according to the matching decisions. The record-matching system detects a connected component in the graph from which a qualified connected component is identified based on the minimum connectivity of the qualified connected component. The record-matching system updates the set of data records stored by merging candidate records represented by the nodes in the qualified connected component.

Classes IPC  ?

  • G06F 16/23 - Mise à jour
  • G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
  • G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage

45.

RECORDS MATCHING TECHNIQUES FOR FACILITATING DATABASE SEARCH AND FRAGMENTED RECORD DETECTION

      
Numéro d'application 18700779
Statut En instance
Date de dépôt 2021-10-13
Date de la première publication 2024-12-12
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Sivaraj, Sunit
  • Cyzio, Marek
  • Patel, Piyush
  • King, Michele
  • Bondugula, Rajkumar

Abrégé

In some aspects, a record-matching computing system for matching records to facilitate database search and fragmented records detection is provided. The record-matching computing system is configured to receiving a query record and search in a data repository storing data records for a record that matches the query record. The record-matching computing system retrieves a reference record from the data records and generates multiple identifier scores. Each identifier score measures a degree of matching between the corresponding identifiers in the query record and the reference record. The record-matching computing system generates an overall matching score by combining at least two of the identifier scores and determines the reference record as a match to the query record based on the overall matching score exceeding a threshold value.

Classes IPC  ?

  • G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
  • G06F 16/2458 - Types spéciaux de requêtes, p. ex. requêtes statistiques, requêtes floues ou requêtes distribuées

46.

RECORDS MATCHING TECHNIQUES FOR FACILITATING DATABASE SEARCH AND FRAGMENTED RECORD DETECTION

      
Numéro d'application 18700775
Statut En instance
Date de dépôt 2021-10-13
Date de la première publication 2024-12-12
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Sivaraj, Sunit
  • Cyzio, Marek
  • Patel, Piyush
  • King, Michele
  • Bondugula, Rajkumar

Abrégé

In some aspects, a record-matching computing system for matching records to facilitate database search and fragmented records detection is provided. The record-matching computing system is configured to search for a data record that matches a query record. The record-matching computing system retrieves a reference record from data records and generates multiple identifier attributes for the query record and reference record, including identifier scores and compound scores. Each identifier score measures a degree of matching between the corresponding identifiers in the query record and reference record. A compound score is generated by combining two or more identifier scores. The record-matching computing system applies the identifier attributes to a machine learning model configured to predict a match classification based on input identifier attributes for a pair of data records. The record-matching server can identify the reference records as a match to the query record based on the match classification indicating a match.

Classes IPC  ?

  • G06F 16/245 - Traitement des requêtes
  • G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet
  • G06N 20/00 - Apprentissage automatique

47.

DATA COMPRESSION TECHNIQUES FOR MACHINE LEARNING MODELS

      
Numéro d'application 18792005
Statut En instance
Date de dépôt 2024-08-01
Date de la première publication 2024-11-28
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Guo, Bo
  • Bondugula, Rajkumar

Abrégé

In some aspects, techniques for creating representative and informative training datasets for the training of machine-learning models are provided. For example, a risk assessment system can receive a risk assessment query for a target entity. The risk assessment system can compute an output risk indicator for the target entity by applying a machine learning model to values of informative attributes associated with the target entity. The machine learning model may be trained using training samples selected from a representative and informative (RAI) dataset. The RAI dataset can be created by determining the informative attributes based on attributes used by a set of models and further extracting representative data records from an initial training dataset based on the determined informative attributes. The risk assessment system can transmit a responsive message including the output risk indicator for use in controlling access of the target entity to an interactive computing environment.

Classes IPC  ?

  • G06F 18/214 - Génération de motifs d'entraînementProcédés de Bootstrapping, p. ex. ”bagging” ou ”boosting”
  • G06N 20/00 - Apprentissage automatique

48.

Universal Digital Identity Authentication Service

      
Numéro d'application 18795982
Statut En instance
Date de dépôt 2024-08-06
Date de la première publication 2024-11-28
Propriétaire
  • Equifax, Inc. (USA)
  • FIDELITY INFORMATION SERVICES, LLC (USA)
Inventeur(s)
  • Huffman, Richard
  • Michaelson, Richard
  • Bijlani, Ravindra
  • Salem, Shriram
  • Harris, Rob
  • Van Zyl, Vivian
  • Cano, Helcio
  • Khanna, Gaurav R.
  • Pigg, Esther
  • Romain, Marty

Abrégé

The present disclosure involves systems and methods for identity authentication across multiple institutions using a trusted mobile device as a proxy for a user login. In one example, the operations include identifying a request to trust a particular user associated with a first entity in a digital ID network. A set of personally identifiable information (PII) associated with the user is obtained via the first entity and an identity verification (IDV)/fraud risk analysis is performed. In response to satisfying the analysis, instructions are transmitted to the user to verify the identity via a mobile trust application on an associated mobile device. Upon verification, the mobile device is bound to the user within the digital ID network along with a digital ID associated with the particular user. The digital ID can be used by other entities registered within the digital ID network to authenticate the user.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
  • G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p. ex. lecture de la lumière blanche réfléchie
  • G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
  • G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
  • G06Q 30/018 - Certification d’entreprises ou de produits
  • H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services
  • H04W 12/06 - Authentification
  • H04W 12/12 - Détection ou prévention de fraudes
  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
  • H04W 12/63 - Sécurité dépendant du contexte dépendant de la localisationSécurité dépendant du contexte dépendant de la proximité
  • H04W 12/67 - Sécurité dépendant du contexte dépendant du risque, p. ex. choix du niveau de sécurité selon les profils de risque

49.

CONFIGURATION OF USER INTERFACE FOR RISK ASSESSMENT VISUALIZATION

      
Numéro d'application 18294330
Statut En instance
Date de dépôt 2022-08-01
Date de la première publication 2024-10-17
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Du Preez, Warren
  • Huang, Bowen

Abrégé

In some embodiments, a data visualization system accesses data entries associated with entities and obtained from multiple data sources. The data visualization system generates a classification map for the entities by classifying the entities into groups based on the data entries from the multiple data sources. The groups are arranged in the classification map according to values of the data entries of the entities. The data visualization system determines one or more metrics for the groups. The data visualization system further determines visualizations based on the classification map, each visualization representing a metric or the data entries from one of the data sources. The data visualization system generates, for inclusion in a user interface of the system, selectable interface elements configured for invoking an editing tool for updating the visualizations. The selectable interface elements for the visualizations are arranged in the respective visualizations according to the classification map.

Classes IPC  ?

  • G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
  • G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations

50.

APPLYING NATURAL LANGUAGE PROCESSING (NLP) TECHNIQUES TO TIME SERIES DATA TO DERIVE ATTRIBUTES FOR USE WITH A MACHINE-LEARNING MODEL

      
Numéro d'application 18194982
Statut En instance
Date de dépôt 2023-04-03
Date de la première publication 2024-10-03
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Jordan, Lewis Charles
  • Avila Rosales, Felipe Alfonso
  • Woodford, Terry
  • Miller, Stephen
  • Turner, Matthew

Abrégé

Techniques are described herein for applying natural language processing (NLP) techniques to time series data to derive attributes of an object for use with a machine-learning model. In one example, a system can receive a time series associated with an object over a time window, where the time series includes a set of discrete values. The system can then generate a time series encoding based on the time series. The system can provide the time series encoding as input to a trained natural language processing (NLP) model, which can generate one or more output embeddings based on the time series encoding. Next, the system can determine at least one attribute associated with the object based on the one or more output embeddings. The system can then provide the attributes for use with a machine-learning model, which may for example be configured to predict a future characteristic of the object.

Classes IPC  ?

51.

Automatically generating search indexes for expediting searching of a computerized database

      
Numéro d'application 18181785
Numéro de brevet 12321387
Statut Délivré - en vigueur
Date de dépôt 2023-03-10
Date de la première publication 2024-09-12
Date d'octroi 2025-06-03
Propriétaire Equifax Inc. (USA)
Inventeur(s)
  • Sivaraj, Sunit
  • Cyzio, Marek Ludomir
  • Syed, Haroon
  • Syed, Khizer Daniyal

Abrégé

Search indexes can be automatically generated and used for expediting searching of a computerized database. For example, a system can access an inquiry dataset that includes relationships between prior inquiries and returned records from a database. The system can then generate a set of Boolean indexes based on the prior inquiries. The system can then identify frequent indexes that occur at least a threshold number of times in the set of Boolean indexes and that have estimated candidate sizes that are less than a threshold size. The system can then select the frequent index with the highest frequency from among the frequent indexes. The selected frequent index can be subsequently used to expedite searching of the database in response to receiving a search query associated with the frequent index from a client device.

Classes IPC  ?

  • G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage
  • G06F 16/9535 - Adaptation de la recherche basée sur les profils des utilisateurs et la personnalisation

52.

SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO COMPUTING SYSTEMS BASED ON DYNAMIC STATE INFORMATION

      
Numéro d'application 18593377
Statut En instance
Date de dépôt 2024-03-01
Date de la première publication 2024-09-05
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Hunter, Jennifer
  • Lewandowski, Lisa
  • Bianco, Amanda
  • Dayalan, Usha Rani

Abrégé

A system can generate a risk report associated with a target entity. For example, the system can receive a request for a risk report associated with a target entity. The system can retrieve a set of records associated with the target entity where each record is associated with a state. The system can generate a first GUI including a selectable list of states associated with each record of the set of records. The system can receive a selection of a first subset of states. The system can transmit, to a remote computing device, the risk report including at least information from a first subset of records associated with the first subset of states for use in controlling access of the target entity to one or more interactive computing environments. The risk report can be used for controlling access of the target entity to one or more interactive computing environments.

Classes IPC  ?

  • G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations

53.

SECURE RESOURCE MANAGEMENT TO PREVENT RESOURCE ABUSE

      
Numéro d'application 18644810
Statut En instance
Date de dépôt 2024-04-24
Date de la première publication 2024-08-22
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Pradhan, Ligaj
  • Patel, Piyush
  • Bondugula, Rajkumar

Abrégé

Systems and methods for secure resource management are provided. A secure resource management system receives from a client computing system associated with a resource provider a query for classifying a resource user associated with the resource provider. The secure resource management system determining a set of resource abuser criteria for classifying the resource user as a resource abuser. The secure resource management system determines that the resource user is a resource abuser or a potential resource abuser based on the set of resource abuser criteria and a resource transaction history associated with the resource user. Based on determining that the resource user is a resource abuser or a potential resource abuser, the secure resource management system generates and transmits a response to the query to the client computing system. The response can be used to restrict or deny access to the resource by the resource user.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p. ex. de l'unité centrale de traitement [UCT]
  • G06F 9/46 - Dispositions pour la multiprogrammation

54.

PRECURSOR LEARNING FOR LABEL REFINEMENT OF MACHINE LEARNING TRAINING SIGNALS

      
Numéro d'application US2023062679
Numéro de publication 2024/172842
Statut Délivré - en vigueur
Date de dépôt 2023-02-15
Date de publication 2024-08-22
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Madarshahian, Ramin
  • Jones, Matthew Lewis

Abrégé

Systems and methods for improving machine learning model predictive capabilities relative to time dependent unbalanced datasets. A separately trained (precursor) data classification machine learning model is utilized to refine training data by removing the time dependence of certain data samples in a given dataset, identify initially misidentified or misclassified data samples, and accordingly, modify a supervisory signal associated with the data used relative to subsequently training a main machine learning model. Systems and methods according to aspects of the present disclosure improve the ability of the main machine learning model to make accurate predictions with respect time dependent unbalanced datasets, while requiring less memory and processor resources for training.

Classes IPC  ?

  • G06N 20/00 - Apprentissage automatique
  • G06Q 40/00 - FinanceAssuranceStratégies fiscalesTraitement des impôts sur les sociétés ou sur le revenu

55.

MACHINE-LEARNING TECHNIQUES INVOLVING MONOTONIC RECURRENT NEURAL NETWORKS

      
Numéro d'application 18606493
Statut En instance
Date de dépôt 2024-03-15
Date de la première publication 2024-08-08
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Boardman, Jonathan
  • Huang, Xiao

Abrégé

Various aspects involve a monotonic recurrent neural network (MRNN) trained for risk assessment or other purposes. For instance, the MRNN is trained to compute a risk indicator from a predictor variable. Training the MRNN includes adjusting weights of nodes of the MRNN subject to a set of monotonicity constraints, wherein the set of monotonicity constraints causes output risk indicators computed by the RNN to be a monotonic function of input predictor variables. The trained monotonic RNN can be used to generate an output risk indicator for a target entity.

Classes IPC  ?

56.

Confirming authenticity of a user to a third-party system

      
Numéro d'application 18631333
Numéro de brevet 12261846
Statut Délivré - en vigueur
Date de dépôt 2024-04-10
Date de la première publication 2024-08-01
Date d'octroi 2025-03-25
Propriétaire
  • Equifax, Inc. (USA)
  • Fidelity Information Services, Inc. (USA)
Inventeur(s)
  • Cano, Helcio
  • Huffman, Rich
  • Bijlani, Ravindra
  • Michaelson, Richard
  • Harris, Rob
  • Van Zyl, Vivian
  • Pigg, Esther
  • Romain, Marty

Abrégé

A telecommunications network server system provides a digital identifier to a user device. The digital identifier may include identification data corresponding to a user of the user device. In addition, the telecommunications network server system receives, from one or more third-party systems, requests to authenticate the user for an electronic transaction with the respective third-party system. The telecommunications network server system provides a unique electronic transaction code to each third-party system. Responsive to receiving from the user device one of the unique electronic transaction codes, the telecommunications network server system provides, to the respective third-party system, authentication of the user.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 67/306 - Profils des utilisateurs
  • H04W 12/06 - Authentification

57.

MACHINE-LEARNING FOR CONTENT INTERACTION

      
Numéro d'application US2022082563
Numéro de publication 2024/144808
Statut Délivré - en vigueur
Date de dépôt 2022-12-29
Date de publication 2024-07-04
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Shen, Cuizhen
  • Ippolito, Sean
  • Ranganathan, Arunkumar

Abrégé

A system can generate content recommendations and facilitate interactions using machine-learning. The system can receive a request from a provider entity. The system can receive entity data and interaction data associated with a target entity. The system can generate at least a first graph structure and a second graph structure. The system can generate a linked graph structure based on the first graph structure and the second graph structure. The system can determine among a plurality of operations, one or more target operations to perform on data included in the linked graph structure. The system can execute using a trained machine-learning model, the target operations to generate a content recommendation for facilitating an interaction. The system can provide a responsive message based on the content recommendation usable to facilitate the interaction.

Classes IPC  ?

  • G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage
  • G06F 16/9035 - Filtrage basé sur des données supplémentaires, p. ex. sur des profils d'utilisateurs ou de groupes
  • G06F 16/957 - Optimisation de la navigation, p. ex. mise en cache ou distillation de contenus

58.

EXPLAINABLE MACHINE-LEARNING TECHNIQUES FROM MULTIPLE DATA SOURCES

      
Numéro d'application US2022082376
Numéro de publication 2024/136904
Statut Délivré - en vigueur
Date de dépôt 2022-12-23
Date de publication 2024-06-27
Propriétaire EQUIFAX INC. (USA)
Inventeur(s) Miller, Stephen

Abrégé

In some aspects, a computing system can generate and optimize a hybrid machine learning model for risk assessment based on predictor variables associated with a target entity. The hybrid machine learning model can be trained using training vectors with sets of training predictor variables and training outputs corresponding to the respective sets of training predictor variables. The predictor variables associated with the target entity may include unknown values and the training predictor variables or trainings output may also include unknown values. Additionally, the computing system can generate explanatory data for the target entity to indicate relationships between changes in the risk indicator and changes in the predictor variables associated with the target entity. The risk indicator and the explanatory data can be used in controlling access of the target entity to interactive computing environments.

Classes IPC  ?

  • G06N 7/01 - Modèles graphiques probabilistes, p. ex. réseaux probabilistes
  • G06N 20/20 - Techniques d’ensemble en apprentissage automatique

59.

CLUSTERING TECHNIQUES FOR MACHINE LEARNING MODELS

      
Numéro d'application US2022082377
Numéro de publication 2024/136905
Statut Délivré - en vigueur
Date de dépôt 2022-12-23
Date de publication 2024-06-27
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Patel, Piyush
  • Overstreet, Dessa
  • Bondugula, Rajkumar

Abrégé

In some aspects, systems and methods for efficiently clustering a large-scale dataset for improving the construction and training of machine-learning models, such as neural network models, are provided. Clustering can include determining a number of clusters to be generated for the dataset. A dataset used for training a neural network model configured can be clustered into a set of clusters. The clustering can include determining the number of clusters, determining special features for the determined number of clusters, and re-clustering the dataset based on the special features. The neural network can be trained based on training samples selected from the set of clusters. In some aspects, the trained neural network model can be utilized to satisfy risk assessment queries to compute output risk indicators for target entities. The output risk indicator can be used to control access to one or more interactive computing environments by the target entities.

Classes IPC  ?

  • G06N 3/0499 - Réseaux à propagation avant
  • G06N 3/088 - Apprentissage non supervisé, p. ex. apprentissage compétitif
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
  • G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
  • G06N 3/084 - Rétropropagation, p. ex. suivant l’algorithme du gradient

60.

Techniques for prediction models using time series data

      
Numéro d'application 18415258
Numéro de brevet 12284071
Statut Délivré - en vigueur
Date de dépôt 2024-01-17
Date de la première publication 2024-06-13
Date d'octroi 2025-04-22
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Huang, Xiao
  • Wang, Yan

Abrégé

Various aspects involve a lagged prediction model trained for risk assessment or other purposes. For instance, a risk assessment computing system receives a risk assessment query for a target entity and provides an input predictor record for the target entity to a lagged prediction model. The input predictor record includes a first group of lagged values from a first time-series attribute associated with the target entity. The lagged prediction model is trained by implementing a group feature selection technique configured to select the first time-series attribute as input and to deselect a second time-series attribute associated with the target entity. The risk assessment computing system computes an output risk indicator from the input predictor record and transmits the output risk indicator to a remote computing system. The output risk indicator can be used to control access by the target entity to one or more interactive computing environments.

Classes IPC  ?

  • H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
  • H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
  • H04L 43/04 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux
  • H04L 43/067 - Génération de rapports en utilisant des rapports de délai

61.

Automated path-based recommendation for risk mitigation

      
Numéro d'application 18402921
Numéro de brevet 12288175
Statut Délivré - en vigueur
Date de dépôt 2024-01-03
Date de la première publication 2024-06-06
Date d'octroi 2025-04-29
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Miller, Stephen
  • Jordan, Lewis
  • Turner, Matthew
  • Day, Mark
  • Joshua, Allan

Abrégé

Systems and methods for automated path-based recommendation for risk mitigation are provided. An entity assessment server, responsive to a request for a recommendation for modifying a current risk assessment score of an entity to a target risk assessment score, accesses an input attribute vector for the entity and clusters of entities defined by historical attribute vectors. The entity assessment server assigns the input attribute vector to a particular cluster and determines a requirement on movement from a first point to a second point in a multi-dimensional space based on the statistics computed from the particular cluster. The first point corresponds to the current risk assessment score and the second point corresponds to the target risk assessment score. The entity assessment server computes an attribute-change vector so that a path defined by the attribute-change vector complies with the requirement and generates the recommendation from the attribute-change vector.

Classes IPC  ?

  • G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projetsPlanification d’entreprise ou d’organisationModélisation d’entreprise ou d’organisation
  • G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
  • G06Q 40/03 - CréditsPrêtsLeur traitement

62.

Historical risk assessment for risk mitigation in online access control

      
Numéro d'application 18060460
Numéro de brevet 12235971
Statut Délivré - en vigueur
Date de dépôt 2022-11-30
Date de la première publication 2024-05-30
Date d'octroi 2025-02-25
Propriétaire Equifax Inc. (USA)
Inventeur(s)
  • Alam, Md Shafiul
  • Boardman, Jonathan
  • Huang, Xiao
  • Dugger, Jeffery
  • Turner, Matthew

Abrégé

Systems and methods for automated historical risk assessment for risk mitigation in online access control are provided. An entity assessment server can receive a request to assess a risk indicator change from a first risk indicator to a second risk indicator. For each attribute used to generate the first risk indicator and second risk indicator, a first impact can be determined for changing from the first risk indicator to a third risk indicator between the first risk indicator and the second risk indicator. A second impact similarly can be determined for changing from the third risk indicator to the second risk indicator. Aggregating the first impact and the second impact can determine a total impact of each attribute. Assessment results can be generated to include a list of attributes ordered according to the respective total impact and transmitted to a remote computing device for use in improving the risk indicator.

Classes IPC  ?

  • G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

63.

Dual deep learning architecture for machine-learning systems

      
Numéro d'application 18405709
Numéro de brevet 12277759
Statut Délivré - en vigueur
Date de dépôt 2024-01-05
Date de la première publication 2024-05-02
Date d'octroi 2025-04-15
Propriétaire Equifax Inc. (USA)
Inventeur(s)
  • Xie, Ying
  • Le, Linh

Abrégé

Certain aspects involve a machine-learning query system that uses a dual deep learning network to service queries and other requests. In one example, a machine-learning query system services a query received from a client computing system. A dual deep learning network included in the machine-learning query system matches an unstructured input data object, received from the client computing system, to an unstructured reference data object. The matching may include generating an input feature vector by an embedding subnetwork, based on the unstructured input data object. The matching may also include generating an output probability by a relationship subnetwork, based on the input feature vector and a relationship feature vector that is based on the unstructured reference data object. The machine-learning query system may transmit a responsive message to the client system.

Classes IPC  ?

  • G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
  • G06F 16/583 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
  • G06F 16/903 - Requêtes
  • G06F 18/21 - Conception ou mise en place de systèmes ou de techniquesExtraction de caractéristiques dans l'espace des caractéristiquesSéparation aveugle de sources
  • G06N 3/045 - Combinaisons de réseaux
  • G06N 3/08 - Méthodes d'apprentissage
  • G06V 10/44 - Extraction de caractéristiques locales par analyse des parties du motif, p. ex. par détection d’arêtes, de contours, de boucles, d’angles, de barres ou d’intersectionsAnalyse de connectivité, p. ex. de composantes connectées
  • G06V 10/764 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant la classification, p. ex. des objets vidéo
  • G06V 40/16 - Visages humains, p. ex. parties du visage, croquis ou expressions

64.

Automated decision techniques for controlling resource access

      
Numéro d'application 18392594
Numéro de brevet 12375424
Statut Délivré - en vigueur
Date de dépôt 2023-12-21
Date de la première publication 2024-04-18
Date d'octroi 2025-07-29
Propriétaire Equifax Inc. (USA)
Inventeur(s)
  • Hoover, Todd Duncan
  • Recker, Brandi Nicole
  • Gates, William Charles
  • Mckeown, Sean Patrick
  • Jackson, Matthew Richard
  • Wadhwani, Dinesh Hiro

Abrégé

A durability assessment system may receive a request, from a computing system, for a durability index describing an entity. The durability assessment system may determine the durability index based on information about the resource usage by the entity, such as a resource availability score or a resource allocation score. The durability assessment system may compare the obtained resource availability score and resource allocation score to ranges associated with a set of durability indices. Based on the comparison, the durability assessment system may determine a durability index for the entity. The durability index may indicate an ability of the entity to return accessed resources. In some cases, the durability assessment system may provide the durability index to an allocation computing system that is configured to determine whether to grant access to resources based on the durability index.

Classes IPC  ?

  • H04L 47/70 - Contrôle d'admissionAllocation des ressources
  • H04L 47/74 - Mesures pour pallier la non-disponibilité des ressources
  • H04L 47/762 - Contrôle d'admissionAllocation des ressources en utilisant l'allocation dynamique des ressources, p. ex. renégociation en cours d'appel sur requête de l'utilisateur ou sur requête du réseau en réponse à des changements dans les conditions du réseau déclenchée par le réseau
  • H04L 47/78 - Architectures d'allocation des ressources

65.

Real-time servicing of verification queries using hybrid data sources

      
Numéro d'application 18047615
Numéro de brevet 12353584
Statut Délivré - en vigueur
Date de dépôt 2022-10-18
Date de la première publication 2024-04-18
Date d'octroi 2025-07-08
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Bertolino, Juan Martin
  • Penumacha, Sankar Rao

Abrégé

In some aspects, a verification system can receive a verification query from a verifier computing system for requesting verification of characteristics of an entity involved in an online interaction. The verification query can include a unique identifier (“UID”) of the entity. The verification computing system can query a verification repository in the verification computing system based on the UID. Additionally, the verification computing system can query an external-source cache using the UID. In response to determine a match for the UID in the external-source cache, the verification computing system can request external sensitive data records for the entity from an external source corresponding to the external-source cache. Generating consolidated sensitive data records can involve consolidating the external sensitive data records and internal sensitive data records obtained through querying the verification repository. A verification result, generated using the consolidated sensitive data records, can be transmitted to the verifier computing system.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04L 9/40 - Protocoles réseaux de sécurité

66.

ENTITY PROFILE FOR ACCESS CONTROL

      
Numéro d'application 17930970
Statut En instance
Date de dépôt 2022-09-09
Date de la première publication 2024-03-14
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Sarathy, Priya
  • Kumar, Sukesh
  • Kataria, Lalit
  • Freeman, Duncan
  • Tirunellayi, Sri Ram

Abrégé

A system can efficiently control access to an interactive computing environment using an entity profile. The system can receive entity data relating to a target entity. The entity data can include real-time data and external data. The system can extract features from the entity data. The system can generate signals based on the features. Each signal can include a subset of the features, and each signal can correspond to an amount of risk associated with the target entity. The system can generate, based on the signals, an entity profile. The system can provide a responsive message based on the entity profile that can be used to control access to an interactive computing environment.

Classes IPC  ?

  • G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives

67.

ENTITY PROFILE FOR ACCESS CONTROL

      
Numéro d'application US2023073317
Numéro de publication 2024/054781
Statut Délivré - en vigueur
Date de dépôt 2023-09-01
Date de publication 2024-03-14
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Sarathy, Priya
  • Kumar, Sukesh
  • Kataria, Lalit
  • Freeman, Duncan
  • Tirunellayi, Sri Ram

Abrégé

A system can efficiently control access to an interactive computing environment using an entity profile. The system can receive entity data relating to a target entity. The entity data can include real-time data and external data. The system can extract features from the entity data. The system can generate signals based on the features. Each signal can include a subset of the features, and each signal can correspond to an amount of risk associated with the target entity. The system can generate, based on the signals, an entity profile. The system can provide a responsive message based on the entity profile that can be used to control access to an interactive computing environment.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations
  • G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives

68.

Facilitating queries of encrypted sensitive data via encrypted variant data objects

      
Numéro d'application 18487730
Numéro de brevet 12254016
Statut Délivré - en vigueur
Date de dépôt 2023-10-16
Date de la première publication 2024-02-08
Date d'octroi 2025-03-18
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Sankaran, Yuvaraj
  • Nagarajan, Vijay

Abrégé

Various aspects of this disclosure provide digital data processing systems for using encrypted variant data objects to facilitate queries of sensitive data. In one example, a digital data processing system can receive sensitive data about an entity. The digital data processing system can create, in an identity data repository and from the sensitive data, a searchable secure entity data object for the entity. The searchable secure entity data object is usable for servicing a query regarding the entity. For instance, a transformed query parameter can be generated from a query parameter in the query. The query can be serviced by matching the transformed query parameter to tokenized variant data in the searchable secure entity data object and retrieving tokenized sensitive data from the searchable secure entity data object.

Classes IPC  ?

  • G06F 16/2458 - Types spéciaux de requêtes, p. ex. requêtes statistiques, requêtes floues ou requêtes distribuées
  • G06F 16/2453 - Optimisation des requêtes
  • G06F 16/2455 - Exécution des requêtes
  • G06F 21/60 - Protection de données
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 40/284 - Analyse lexicale, p. ex. segmentation en unités ou cooccurrence

69.

PEOPLEHQ

      
Numéro de série 98388873
Statut Enregistrée
Date de dépôt 2024-02-02
Date d'enregistrement 2024-12-10
Propriétaire Equifax Inc. ()
Classes de Nice  ?
  • 35 - Publicité; Affaires commerciales
  • 42 - Services scientifiques, technologiques et industriels, recherche et conception

Produits et services

Employment verification services Platform as a Service (PAAS) featuring non-downloadable software for use by employers, namely, providing a secure solution for facilitating completion, review, and retention of employer-related forms, employment verification, compliance with federal laws, management of tax credits, generation of reports, measurement of compliance. risk decisioning and analysis, creation of audit trails, and responding to audits; Computer services, namely, providing an interactive web site that allows users to manage Affordable Care Act compliance, employee benefits and workforce hours; Platform as a service (PAAS) featuring computer software platforms for managing Affordable Care Act compliance, tax credits, employee benefits and workforce hours, risk decisioning and analysis, creation of audit trails, and responding to audits; Providing a web hosting platform in the nature of providing a website featuring technology that enables users to manage affordable care act (ACA) compliance, employee benefits, and respond to audits

70.

Facilitating entity resolution, keying, and search match without transmitting personally identifiable information in the clear

      
Numéro d'application 18469285
Numéro de brevet 12400036
Statut Délivré - en vigueur
Date de dépôt 2023-09-18
Date de la première publication 2024-01-04
Date d'octroi 2025-08-26
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Jones, Gregory Dean
  • Cyzio, Marek Ludomir
  • Worrell, Amy Michelle

Abrégé

In some aspects, an entity-resolution computing system for entity resolution is provided. The entity-resolution computing system includes an entity-resolution server configured for correlating data objects from an identity data repository that contains account or transaction data for entities based on the data objects including a common portion of the account or transaction data. The entity-resolution server updates the identity data repository to include an entity identifier that links the data objects and indicates that the data objects refer to a common entity. The entity-resolution server creates an entity-resolution data structure having the data objects with the entity identifier and a new variant data object containing a modified version of account or transaction data that match the common entity. The entity-resolution server encrypts the entity-resolution data structure and causes the encrypted entity-resolution data structure to be transmitted to a client computing system for use in augmenting client data.

Classes IPC  ?

  • G06F 16/2452 - Traduction des requêtes
  • G06F 16/23 - Mise à jour
  • G06F 16/2458 - Types spéciaux de requêtes, p. ex. requêtes statistiques, requêtes floues ou requêtes distribuées
  • G06F 21/60 - Protection de données
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès

71.

EXPLAINABLE MACHINE-LEARNING MODELING USING WAVELET PREDICTOR VARIABLE DATA

      
Numéro d'application 18252660
Statut En instance
Date de dépôt 2021-11-11
Date de la première publication 2024-01-04
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Dugger, Jeffery
  • Woodford, Terry
  • Hamilton, Howard H.
  • Mcburnett, Michael
  • Miller, Stephen

Abrégé

A host computing system determines a wavelet transform that represents time-series values of predictor data samples. The host computing system applies the wavelet transform to the predictor data samples to generate wavelet predictor variable data comprising a first set and a second set of shift value input data for a first scale and a second scale. The host computing system computes a set of probabilities for a target event by applying a set of timing-prediction models to the first set and the second set of shift value input data. The host computing system determines an event prediction from the set of probabilities and modifies a host system operation based on the determined event prediction.

Classes IPC  ?

  • G06N 3/08 - Méthodes d'apprentissage
  • G06N 5/022 - Ingénierie de la connaissanceAcquisition de la connaissance

72.

Constructing executable program code based on sequence codes

      
Numéro d'application 18253466
Numéro de brevet 12430106
Statut Délivré - en vigueur
Date de dépôt 2021-11-22
Date de la première publication 2023-12-28
Date d'octroi 2025-09-30
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Chern, Jih-Shiang
  • Yan, Bo

Abrégé

Methods described herein generate executable program code based on sequence codes, such that the executable program code is executable by a computer processor. According to such a method, a command is received to generate executable program code. Via a code-building interface, user input is received indicating an operation to be performed by the executable program code, a data type for to the executable program code, and a condition for applying the executable program code. A sequence code is constructed to represent the user input, where the sequence code includes a sequence of character sets. From the sequence code, a first character set corresponding to the operation, a second character set corresponding to the data type, and a third character set corresponding to the condition are extracted. Mapping data is applied to the first character set, the second character set, and the third character set to generate the executable program code.

Classes IPC  ?

  • G06F 8/34 - Programmation graphique ou visuelle
  • G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur

73.

Verification of access to secured electronic resources

      
Numéro d'application 18364926
Numéro de brevet 12443692
Statut Délivré - en vigueur
Date de dépôt 2023-08-03
Date de la première publication 2023-11-23
Date d'octroi 2025-10-14
Propriétaire EQUIFAX INC. (USA)
Inventeur(s) Allen, Kenneth

Abrégé

Aspects and examples are disclosed for improving multi-factor authentication techniques to control access to secured electronic resources. In one example, a decisioning computer system evaluates, based on a passive-dimension decision process, an access request, received from a user device, for a secured electronic resource. The passive-dimension decision process can evaluate dimensions associated with the access request, such as identity or device characteristics, to determine whether the dimensions of the access request are outside of norms for the user. Based on the passive-dimension decision model, the decisioning computing device may communicate to the user device an access decision, the access decision describing one or more of an access authorization, a denial of access, or a supplemental authentication challenge.

Classes IPC  ?

  • H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
  • G06F 21/31 - Authentification de l’utilisateur
  • G06F 21/44 - Authentification de programme ou de dispositif
  • G06N 5/01 - Techniques de recherche dynamiqueHeuristiquesArbres dynamiquesSéparation et évaluation

74.

Machine-learning system for servicing queries for digital content

      
Numéro d'application 18359790
Numéro de brevet 12222988
Statut Délivré - en vigueur
Date de dépôt 2023-07-26
Date de la première publication 2023-11-16
Date d'octroi 2025-02-11
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Hicklin, Steven
  • Asheghi, Noushin Rezapour

Abrégé

In some aspects, a content-extraction system can receive a query from a client device and generate a result set of digital content responsive to the query. For instance, the content-extraction system can obtain, from a search system, a set of digital content matching one or more keywords. The content-extraction system can exclude digital content items lacking core content, digital content items with duplicative content, or both. In some aspects, the content-extraction system can determine, for one or more remaining digital content items, a content attribute score. The content-extraction system can select, as the result set of digital content, a subset of digital content based on the content attribute scores. The content-extraction system can output the result set to the client device.

Classes IPC  ?

75.

MULTI-STAGE MACHINE-LEARNING TECHNIQUES FOR RISK ASSESSMENT

      
Numéro d'application 18306103
Statut En instance
Date de dépôt 2023-04-24
Date de la première publication 2023-10-26
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Sankaran, Yuvaraj
  • Obando, Benjamin
  • Bustos, Danilo

Abrégé

Certain embodiments involve providing explainable risk assessment via multi-stage machine-learning techniques. A risk assessment server can determine, in response to a risk assessment query for a target entity, a first risk indicator for the target entity by applying a first risk assessment model to predictor variables associated with the target entity. Responsive to determining that the first risk indicator indicates a risk higher than a threshold value, the risk assessment server can generate explanatory data for the predictor variables and determine a second risk indicator for the target entity by applying a second risk assessment model to the predictor variables associated with the target entity. A response message can be generated and transmitted to include the first risk indicator, the explanatory data, and the second risk indicator, for use in controlling access to one or more interactive computing environments by the target entity.

Classes IPC  ?

76.

UPDATING ATTRIBUTE DATA STRUCTURES TO INDICATE TRENDS IN ATTRIBUTE DATA PROVIDED TO AUTOMATED MODELLING SYSTEMS

      
Numéro d'application 18335124
Statut En instance
Date de dépôt 2023-06-14
Date de la première publication 2023-10-12
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Ouyang, Jeffrey Q.
  • Chang, Vickey
  • Patel, Rupesh
  • Litherland, Trevis J.

Abrégé

Certain aspects involve updating data structures to indicate relationships between attribute trends and response variables used for training automated modeling systems. For example, a data structure stores data for training an automated modeling algorithm. The training data includes attribute values for multiple entities over a time period. A computing system generates, for each entity, at least one trend attribute that is a function of a respective time series of attribute values. The computing system modifies the data structure to include the generated trend attributes and updates the training data to include trend attribute values for the trend attributes. The computing system trains the automated modeling algorithm with the trend attribute values from the data structure. In some aspects, trend attributes are generated by applying a frequency transform to a time series of attribute values and selecting, as trend attributes, some of the coefficients generated by the frequency transform.

Classes IPC  ?

  • G06N 20/00 - Apprentissage automatique
  • G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet
  • G06Q 10/063 - Recherche, analyse ou gestion opérationnelles
  • G06F 17/18 - Opérations mathématiques complexes pour l'évaluation de données statistiques
  • G06N 7/01 - Modèles graphiques probabilistes, p. ex. réseaux probabilistes

77.

Device-agnostic access control techniques

      
Numéro d'application 17657055
Numéro de brevet 12244593
Statut Délivré - en vigueur
Date de dépôt 2022-03-29
Date de la première publication 2023-10-05
Date d'octroi 2025-03-04
Propriétaire Equifax Inc. (USA)
Inventeur(s)
  • Singh, Dilip
  • Keller, Gary
  • Beatty, Robert
  • Tirunellayi, Sriram

Abrégé

A system can efficiently control access to an interactive computing environment. The system can receive authentication data of an authentication attempt associated with an entity. The system can determine, for the entity, a historical vector including features that include sub-features. The historical vector can be determined by generating synthetic data, generating weights, and determining probabilities. The synthetic data can be based on historical authentication attempts by entities other than the entity. The weights can correspond to sub-features of the historical vector. The probabilities can indicate a likelihood that a corresponding sub-feature is involved in the authentication attempt. The system can compare the historical vector to the authentication data. The system can generate a responsive message based on the comparison for controlling access to the interactive computing environment.

Classes IPC  ?

  • G06F 7/04 - Contrôle d'égalité, c.-à-d. pour valeurs égales ou non
  • G06F 18/214 - Génération de motifs d'entraînementProcédés de Bootstrapping, p. ex. ”bagging” ou ”boosting”
  • H04L 9/40 - Protocoles réseaux de sécurité

78.

DEVICE-AGNOSTIC ACCESS CONTROL TECHNIQUES

      
Numéro d'application US2023016406
Numéro de publication 2023/192175
Statut Délivré - en vigueur
Date de dépôt 2023-03-27
Date de publication 2023-10-05
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Singh, Dilip
  • Keller, Gary
  • Beatty, Robert
  • Tirunellayi, Sriram

Abrégé

A system can efficiently control access to an interactive computing environment. The system can receive authentication data of an authentication attempt associated with an entity. The system can determine, for the entity, a historical vector including features that include sub-features. The historical vector can be determined by generating synthetic data, generating weights, and determining probabilities. The synthetic data can be based on historical authentication attempts by entities other than the entity. The weights can correspond to sub-features of the historical vector. The probabilities can indicate a likelihood that a corresponding sub-feature is involved in the authentication attempt. The system can compare the historical vector to the authentication data. The system can generate a responsive message based on the comparison for controlling access to the interactive computing environment.

Classes IPC  ?

  • G06F 21/31 - Authentification de l’utilisateur
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 12/06 - Authentification
  • H04W 12/08 - Sécurité d'accès

79.

MACHINE-LEARNING TECHNIQUES FOR FACTOR-LEVEL MONOTONIC NEURAL NETWORKS

      
Numéro d'application 18006384
Statut En instance
Date de dépôt 2021-07-14
Date de la première publication 2023-09-21
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Turner, Matthew
  • Miller, Stephen

Abrégé

In some aspects, a computing system can generate and optimize a neural network for risk assessment. Input predictor variables can be analyzed to identify common factors of these predictor variables. The neural network can be trained to enforce a monotonic relationship between each common factor of the input predictor variables and an output risk indicator. The training of the neural network can involve solving an optimization problem under this monotonic constraint. The optimized neural network can be used both for accurately determining risk indicators for target entities using predictor variables and determining explanation codes for the predictor variables. Further, the risk indicators can be utilized to control the access by a target entity to an interactive computing environment for accessing services provided by one or more institutions.

Classes IPC  ?

  • G06N 3/0985 - Optimisation d’hyperparamètresMeta-apprentissageApprendre à apprendre

80.

DATA ACCESS CONTROL SYSTEM ACCESSIBLE FROM THIRD-PARTY WEB

      
Numéro d'application 18304344
Statut En instance
Date de dépôt 2023-04-21
Date de la première publication 2023-08-17
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Gupta, Rajan
  • Whitehead, Justin
  • Hanson, Josh

Abrégé

In some aspects, a gateway server can unlock or unfreeze access to data about a user by third parties without requiring the user to navigate completely away from a third-party website through which the user is executing an electronic transaction. The gateway server can receive a request to unlock or unfreeze data through the third-party website hosted by a third-party web server. The gateway server can output a user interface that is displayable simultaneously with the third-party website. Through the user interface, the gateway server can receive sign-in data such as log-in credentials of the user and consent to share data about the user with the third-party web server. The gateway server can output a command to unlock or unfreeze data about the user and to share the data with the third-party web server. Based on the shared data, the transaction can be completed at the third-party web server.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 12/66 - Dispositions pour la connexion entre des réseaux ayant différents types de systèmes de commutation, p. ex. passerelles
  • H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services

81.

Universal digital identity authentication service

      
Numéro d'application 18132536
Numéro de brevet 12074872
Statut Délivré - en vigueur
Date de dépôt 2023-04-10
Date de la première publication 2023-08-10
Date d'octroi 2024-08-27
Propriétaire
  • Fidelity Information Services, LLC (USA)
  • Equifax, Inc. (USA)
Inventeur(s)
  • Huffman, Richard
  • Michaelson, Richard
  • Bijlani, Ravindra
  • Salem, Shriram
  • Harris, Rob
  • Van Zyl, Vivian
  • Cano, Helcio
  • Khanna, Gaurav R.
  • Pigg, Esther
  • Romain, Marty

Abrégé

The present disclosure involves systems and methods for identity authentication across multiple institutions using a trusted mobile device as a proxy for a user login. In one example, the operations include identifying a request to trust a particular user associated with a first entity in a digital ID network. A set of personally identifiable information (PII) associated with the user is obtained via the first entity and an identity verification (IDV)/fraud risk analysis is performed. In response to satisfying the analysis, instructions are transmitted to the user to verify the identity via a mobile trust application on an associated mobile device. Upon verification, the mobile device is bound to the user within the digital ID network along with a digital ID associated with the particular user. The digital ID can be used by other entities registered within the digital ID network to authenticate the user.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • H04W 12/06 - Authentification
  • H04W 12/12 - Détection ou prévention de fraudes
  • H04W 12/30 - Sécurité des dispositifs mobilesSécurité des applications mobiles
  • H04W 12/67 - Sécurité dépendant du contexte dépendant du risque, p. ex. choix du niveau de sécurité selon les profils de risque
  • G06K 7/10 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire
  • G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation électromagnétique, p. ex. lecture optiqueMéthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p. ex. lecture de la lumière blanche réfléchie
  • G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
  • G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
  • G06Q 30/018 - Certification d’entreprises ou de produits
  • H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services
  • H04W 12/63 - Sécurité dépendant du contexte dépendant de la localisationSécurité dépendant du contexte dépendant de la proximité

82.

GRAPH-BASED TECHNIQUES FOR DETECTING SYNTHETIC ONLINE IDENTITIES

      
Numéro d'application 18297544
Statut En instance
Date de dépôt 2023-04-07
Date de la première publication 2023-08-03
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Shen, Cuizhen
  • Ranganathan, Arun
  • Liu, Rong
  • Yan, Nian
  • Ray, John
  • Tirunellayi, Sriram

Abrégé

In some aspects, a computing system is configured to use graph-based techniques to detect synthetic identities. The computing system can generate a collection of graphs based on account data and transaction data for online entities. The collection of graphs includes multiple graph communities, each graph community including nodes and edges. Each node represents a user and an edge between a first node and a second node indicates a user represented by the second node is an authorized user of the user represented by the first node. The computing system can identify a clique graph community in the collection of graphs and compare the identified clique graph community with a known clique graph community that includes synthetic identities. The computing system can determine nodes in the identified clique graph community to be synthetic identities based on determining that the identified clique graph community is equivalent to the known clique graph community.

Classes IPC  ?

83.

Confirming authenticity of a user to a third-party system

      
Numéro d'application 18128628
Numéro de brevet 11962590
Statut Délivré - en vigueur
Date de dépôt 2023-03-30
Date de la première publication 2023-07-27
Date d'octroi 2024-04-16
Propriétaire
  • Equifax, Inc. (USA)
  • Fidelity Information Services, LLC (USA)
Inventeur(s)
  • Cano, Helcio
  • Huffman, Rich
  • Bijlani, Ravindra
  • Michaelson, Richard
  • Harris, Rob
  • Van Zyl, Vivian
  • Pigg, Esther
  • Romain, Marty

Abrégé

A telecommunications network server system provides a digital identifier to a user device. The digital identifier may include identification data corresponding to a user of the user device. In addition, the telecommunications network server system receives, from one or more third-party systems, requests to authenticate the user for an electronic transaction with the respective third-party system. The telecommunications network server system provides a unique electronic transaction code to each third-party system. Responsive to receiving from the user device one of the unique electronic transaction codes, the telecommunications network server system provides, to the respective third-party system, authentication of the user.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 67/53 - Services réseau en utilisant des fournisseurs tiers de services
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 67/306 - Profils des utilisateurs
  • H04W 12/06 - Authentification

84.

TECHNIQUES FOR EVALUATING AN EFFECT OF CHANGES TO MACHINE LEARNING MODELS

      
Numéro d'application 18147967
Statut En instance
Date de dépôt 2022-12-29
Date de la première publication 2023-07-06
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Alfred, Royce
  • Yin, Fan

Abrégé

An auditing system executes a first machine learning model on a first computing platform using input data to generate first output data. The auditing system executes a second machine learning model on a second computing platform using the input data to generate second output data. The second machine learning model is generated by migrating the first machine learning model to the second computing platform. The auditing system determines one or more performance metrics based on comparing the first output data to the second output data. The auditing system classifies, based on the one or more performance metrics, the second machine learning model with a classification. The classification comprises a passing classification or a failing classification. The auditing system causes the second model to be modified responsive to classifying the second model with a failing classification.

Classes IPC  ?

  • G06N 5/022 - Ingénierie de la connaissanceAcquisition de la connaissance

85.

Production-ready attributes creation and management for software development

      
Numéro d'application 18183854
Numéro de brevet 11941377
Statut Délivré - en vigueur
Date de dépôt 2023-03-14
Date de la première publication 2023-07-06
Date d'octroi 2024-03-26
Propriétaire Equifax Inc. (USA)
Inventeur(s)
  • Sankaran, Yuvaraj
  • Castillo Carvajal, Felipe Ernesto
  • Pinzon Pinto, Carlos Augusto
  • Villarroel Gonzalez, Gerardo Jorge
  • Martinez Castro, Pablo Andres

Abrégé

In some aspects, a computing system can determine a set of attributes based on analyzing input data using attribute templates written in a production-ready programming language. The computing system can generate attribute definitions for the set of attributes using the attribute templates and deploy the attribute definitions for the set of attributes to a production environment of a software program. The software program is written in a programming language compatible with the production-ready programming language. The computing system can monitor the performance of the set of attributes in the production environment of the software program and cause the attribute definitions of the plurality of attributes to be modified based on the monitoring.

Classes IPC  ?

  • G06F 8/35 - Création ou génération de code source fondée sur un modèle
  • G06F 8/10 - Analyse des exigencesTechniques de spécification
  • G06F 8/20 - Conception de logiciels
  • G06F 8/30 - Création ou génération de code source
  • G06F 8/36 - Réutilisation de logiciel
  • G06F 8/60 - Déploiement de logiciel
  • G06F 8/70 - Maintenance ou gestion de logiciel
  • G06F 8/73 - Documentation de programme
  • G06F 40/166 - Édition, p. ex. insertion ou suppression
  • G06F 40/174 - Remplissage de formulairesFusion
  • G16H 10/20 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients pour des essais ou des questionnaires cliniques électroniques

86.

Machine-learning techniques for risk assessment based on multiple data sources

      
Numéro d'application 18146305
Numéro de brevet 12373574
Statut Délivré - en vigueur
Date de dépôt 2022-12-23
Date de la première publication 2023-06-29
Date d'octroi 2025-07-29
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Gjorvad, David
  • Pecen, Michael
  • Fenstermaker, Jonathan
  • Ogunyemi-Craig, Oyenola
  • Sundaram, Deepaa

Abrégé

Systems and methods for using machine-learning techniques to provide risk assessment based on multiple sources of data are described herein. Data about an entity can be received, and the data can be authenticated. Integrated risk data about the entity can be received. The integrated risk data can include traditional risk assessment data and nontraditional risk assessment data. An integrated risk assessment value can be determined based on the integrated risk data by aligning a first output from a first risk assessment model and a second output by a second risk assessment model. A responsive message including at least the integrated risk assessment value and associated information for the entity can be transmitted to a remote computing device for use in controlling access of the entity to one or more interactive computing environments.

Classes IPC  ?

  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité

87.

Consolidation of data sources for expedited validation of risk assessment data

      
Numéro d'application 18067578
Numéro de brevet 12412210
Statut Délivré - en vigueur
Date de dépôt 2022-12-16
Date de la première publication 2023-06-22
Date d'octroi 2025-09-09
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Huber, Theresa
  • John, Dileep
  • Mudduluri, Balaji
  • Arshad, Muhammad
  • Katabathuni, Kishore Kumar
  • Golla, Saratchandra
  • Vontari, Akshay Reddy

Abrégé

Systems and methods for consolidating data sources for expediting validation processes are described herein. A user interface can be provided to a first entity. First risk assessment data associated with the first entity can be received via the user interface. Second risk assessment data associated with the first entity can be received. The first risk assessment data and the second risk assessment data can be validated. The first risk assessment data and the second risk assessment data can be output for display on the user interface. A responsive message including the validated first risk assessment data and the validated second risk assessment data can be transmitted to a remote computing device for use in controlling access of the first entity to one or more interactive computing environments.

Classes IPC  ?

88.

MACHINE LEARNING MODEL PREDICTIONS VIA AUGMENTING TIME SERIES OBSERVATIONS

      
Numéro d'application 18069594
Statut En instance
Date de dépôt 2022-12-21
Date de la première publication 2023-06-22
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Campolong, James
  • Varughese, Joji
  • Miller, Stephen

Abrégé

A system receives, from a remote computing device, a query for a timing of an adverse event associated with a target entity. The system determines, using a timing prediction model trained using a training process, the timing of the adverse event for the target entity from predictor variables associated with the target entity. The training process includes accessing an observational journal comprising historical panel data of the target entity including values of predictor variables for one or more time points and generating, from historical panel data, an augmented time series by augmenting the historical panel data with values of predictor variables for at time points for which the historical panel data does not include values of predictor variables. The system transmits to the remote computing device, a responsive message including at least the timing of the adverse event for use in controlling access of the target entity to one or more interactive computing environments.

Classes IPC  ?

  • G06N 5/022 - Ingénierie de la connaissanceAcquisition de la connaissance

89.

UNIFIED EXPLAINABLE MACHINE LEARNING FOR SEGMENTED RISK

      
Numéro d'application 17645744
Statut En instance
Date de dépôt 2021-12-22
Date de la première publication 2023-06-22
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Mcburnett, Michael
  • Woodford, Terry

Abrégé

Various aspects involve unified explainable machine learning for segmented risk assessment. For example, a computing device can determine, using a unified model built from segment models, a risk indicator for a target entity from predictor variables associated with the target entity. The target entity belongs to one of a plurality of entity segments each associated with a segment model of the segment models. The unified model is generated by: accessing training samples for the entity segments; training the segment models using respective training samples for the entity segments; constructing the unified risk prediction model by stacking the trained segment models; and training the unified risk prediction model using the training samples for the entity segments. The computing device can transmit, to a remote computing device, a responsive message including at least the risk indicator for use in controlling access of the target entity to an interactive computing environment.

Classes IPC  ?

  • G06N 5/04 - Modèles d’inférence ou de raisonnement
  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques

90.

EXPLAINABLE MACHINE LEARNING BASED ON WAVELET ANALYSIS

      
Numéro d'application US2022081836
Numéro de publication 2023/115019
Statut Délivré - en vigueur
Date de dépôt 2022-12-16
Date de publication 2023-06-22
Propriétaire EQUIFAX INC. (USA)
Inventeur(s) Dugger, Jeffery

Abrégé

A method can be used to predict risk and provide explainable outcomes using machine learning based on wavelet analysis. A risk prediction model can be applied to time-series data for an attribute associated with a target entity to generate a risk indicator for the target entity. The risk prediction model can include a feature learning model and a risk classification model configured to generate the risk indicator as output. Parameters of the feature learning model can be accessed and a plurality of basis functions of a wavelet transformation can be applied on the parameters of the feature learning model to generate a set of parameter wavelet coefficients. Explanatory data can be generated for the risk indicator based on the set of parameter wavelet coefficients. A responsive message can be transmitted to a remote computing device including the risk indicator and the explanatory data for use in controlling access of the target entity to an interactive computing environment.

Classes IPC  ?

  • G06N 3/0464 - Réseaux convolutifs [CNN, ConvNet]
  • G06F 17/14 - Transformations de Fourier, de Walsh ou transformations d'espace analogues
  • G06F 21/60 - Protection de données
  • G06N 3/09 - Apprentissage supervisé
  • G06Q 10/0635 - Analyse des risques liés aux activités d’entreprises ou d’organisations

91.

EXPLAINABLE MACHINE LEARNING BASED ON TIME-SERIES TRANSFORMATION

      
Numéro d'application US2021072813
Numéro de publication 2023/107134
Statut Délivré - en vigueur
Date de dépôt 2021-12-08
Date de publication 2023-06-15
Propriétaire EQUIFAX INC. (USA)
Inventeur(s) Miller, Stephen

Abrégé

Various aspects involve explainable machine learning based on time-series transformation. For instance, a computing system accesses time-series data of a predictor variable associated with a target entity. The computing system generates a first set of transformed time-series data instances by applying a first family of transformations on the time-series data. Any non-negative linear combination of the first family of transformations forms an interpretable transformation of the time-series data. The computing system determines a risk indicator for the target entity indicating a level of risk associated with the target entity by inputting the first set of transformed time-series data instances into a machine learning model. The computing system transmits, to a remote computing device, a responsive message including the risk indicator. The risk indicator is usable for controlling access to one or more interactive computing environments by the target entity.

Classes IPC  ?

  • G06N 3/04 - Architecture, p. ex. topologie d'interconnexion
  • G06N 3/08 - Méthodes d'apprentissage

92.

DATA VALIDATION TECHNIQUES FOR SENSITIVE DATA MIGRATION ACROSS MULTIPLE PLATFORMS

      
Numéro d'application US2022078550
Numéro de publication 2023/107781
Statut Délivré - en vigueur
Date de dépôt 2022-10-21
Date de publication 2023-06-15
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Singh, Rohit
  • Ghosh, Pinaki
  • Varughese, Joji

Abrégé

Techniques for validating large amounts of sensitive data migrated across multiple platforms without revealing the content of the sensitive data are provided. For example, a processing device can transform data in a first data file stored on a first platform to common data formats. The processing device can generate a first set of hash values. The processing device can receive a second set of hash values for a second data file stored on a second platform. The processing device can compare the first set of hash values and the second set of hash values and cause the first data file or the second data file to be modified based on a difference between the sets of hash values.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
  • G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
  • G06F 21/64 - Protection de l’intégrité des données, p. ex. par sommes de contrôle, certificats ou signatures

93.

Data validation techniques for sensitive data migration across multiple platforms

      
Numéro d'application 17643302
Numéro de brevet 12149613
Statut Délivré - en vigueur
Date de dépôt 2021-12-08
Date de la première publication 2023-06-08
Date d'octroi 2024-11-19
Propriétaire Equifax Inc. (USA)
Inventeur(s)
  • Singh, Rohit
  • Ghosh, Pinaki
  • Varughese, Joji

Abrégé

Techniques for validating large amounts of sensitive data migrated across multiple platforms without revealing the content of the sensitive data are provided. For example, a processing device can transform data in a first data file stored on a first platform to common data formats. The processing device can generate a first set of hash values. The processing device can receive a second set of hash values for a second data file stored on a second platform. The processing device can compare the first set of hash values and the second set of hash values and cause the first data file or the second data file to be modified based on a difference between the sets of hash values.

Classes IPC  ?

  • H04L 9/08 - Répartition de clés
  • H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
  • H04L 67/06 - Protocoles spécialement adaptés au transfert de fichiers, p. ex. protocole de transfert de fichier [FTP]
  • H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]

94.

MACHINE-LEARNING TECHNIQUES FOR RISK ASSESSMENT BASED ON CLUSTERING

      
Numéro d'application 18057147
Statut En instance
Date de dépôt 2022-11-18
Date de la première publication 2023-05-25
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Patel, Piyush
  • Bondugula, Rajkumar

Abrégé

Systems and methods for predicting future risk for a target entity are provided. A risk assessment system receives historical risk assessment data of the target entity and identifies a target cluster that matches the historical risk assessment data. The target cluster is identified from a group of clusters determined using high dimensional clustering based on risk assessment data of a set of entities. The risk assessment system identifies a set of nearest neighbors of the target cluster and determines a prediction of future risk for the target entity based on the target cluster and the set of nearest neighbors. The risk assessment system transmits a responsive message, which can include the prediction of future risk, to a remote computing device for use in controlling access of the target entity to one or more interactive computing environments.

Classes IPC  ?

  • G06N 5/02 - Représentation de la connaissanceReprésentation symbolique

95.

BAYESIAN MODELING FOR RISK ASSESSMENT BASED ON INTEGRATING INFORMATION FROM DYNAMIC DATA SOURCES

      
Numéro d'application US2022079741
Numéro de publication 2023/086954
Statut Délivré - en vigueur
Date de dépôt 2022-11-11
Date de publication 2023-05-19
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Shrestha, Prakash
  • Bondugula, Rajkumar

Abrégé

Bayesian modeling can be used for risk assessment. For example, a computing device determines, using a Bayesian prediction model, a risk indicator for a target entity from predictor variables associated with the target entity. The Bayesian prediction model determines the risk indicator based on a set of parameters associated with the Bayesian prediction model. The Bayesian prediction model is generated based on an initial training dataset. The initial training dataset includes training records and predictor variables. The Bayesian prediction model can be generated by calculating the set of parameters based on the initial training dataset. The Bayesian prediction model can be updated by updating the set of parameters using an additional training dataset. The computing device transmits, to a remote computing device, the risk indicator for use in controlling access of the target entity to one or more interactive computing environments.

Classes IPC  ?

  • G06N 7/01 - Modèles graphiques probabilistes, p. ex. réseaux probabilistes
  • G06N 5/045 - Explication d’inférenceIntelligence artificielle explicable [XAI]Intelligence artificielle interprétable
  • H04L 9/40 - Protocoles réseaux de sécurité

96.

BAYESIAN MODELING FOR RISK ASSESSMENT BASED ON INTEGRATING INFORMATION FROM DYNAMIC DATA SOURCES

      
Numéro d'application 17455015
Statut En instance
Date de dépôt 2021-11-15
Date de la première publication 2023-05-18
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Shrestha, Prakash
  • Bondugula, Rajkumar

Abrégé

Bayesian modeling can be used for risk assessment. For example, a computing device determines, using a Bayesian prediction model, a risk indicator for a target entity from predictor variables associated with the target entity. The Bayesian prediction model determines the risk indicator based on a set of parameters associated with the Bayesian prediction model. The Bayesian prediction model is generated based on an initial training dataset. The initial training dataset includes training records and predictor variables. The Bayesian prediction model can be generated by calculating the set of parameters based on the initial training dataset. The Bayesian prediction model can be updated by updating the set of parameters using an additional training dataset. The computing device transmits, to a remote computing device, the risk indicator for use in controlling access of the target entity to one or more interactive computing environments.

Classes IPC  ?

  • G06N 7/00 - Agencements informatiques fondés sur des modèles mathématiques spécifiques
  • G06N 20/00 - Apprentissage automatique

97.

Interactive model performance monitoring

      
Numéro d'application 18053360
Numéro de brevet 11934290
Statut Délivré - en vigueur
Date de dépôt 2022-11-07
Date de la première publication 2023-05-11
Date d'octroi 2024-03-19
Propriétaire Equifax Inc. (USA)
Inventeur(s)
  • Wang, Zhenyu
  • Chang, Vickey
  • Feng, Jeffrey

Abrégé

Certain aspects involve providing automated performance monitoring of statistical models. For example, a processing device is used for performing a statistical analysis on information in an archive to extract historical data, scores, and attributes. The processing device calculates performance metrics based at least in part on the historical data, scores, and attributes. The processing device pre-calculates summary performance data based at least in part on the performance metrics. The summary performance data is stored in files with predefined layouts, which are stored in a non-transitory, computer-readable medium. Segmented data is presented from a file to a user through a graphical user interface (GUI). In some aspects, various reports of the segmented data are presented interactively by detecting a selection by the user of a segmentation and displaying the corresponding segmented data.

Classes IPC  ?

  • G06F 11/00 - Détection d'erreursCorrection d'erreursContrôle de fonctionnement
  • G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p. ex. des interruptions ou des opérations d'entrée–sortie
  • G06F 16/9038 - Présentation des résultats des requêtes
  • G06F 16/904 - NavigationVisualisation à cet effet
  • G06F 17/18 - Opérations mathématiques complexes pour l'évaluation de données statistiques
  • G06F 40/186 - Gabarits
  • G06Q 10/0639 - Analyse des performances des employésAnalyse des performances des opérations d’une entreprise ou d’une organisation

98.

BIAS DETECTION AND REDUCTION IN MACHINE-LEARNING TECHNIQUES

      
Numéro d'application 18046661
Statut En instance
Date de dépôt 2022-10-14
Date de la première publication 2023-04-20
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Zou, Mufeng
  • Veeravelly, Swathi
  • Bruhn, Marcus

Abrégé

In some aspects, a computing system can improve a machine learning model for risk assessment by removing or reducing bias in the machine learning model. The training process for the machine learning model can include training the machine learning model using training samples, obtaining data for a protected attribute, and calculating a bias metric using the data for the protected attribute and data obtained from the trained machine learning model. Based on the bias metric, bias associated with the machine learning model can be detected. The machine learning model can be modified based on the detected bias and re-trained. The re-trained machine learning model can be used to predict a risk indicator for a target entity. The predicted risk indicator can be transmitted to a remote computing device and be used for controlling access of the target entity to one or more interactive computing environments.

Classes IPC  ?

99.

RECORDS MATCHING TECHNIQUES FOR FACILITATING DATABASE SEARCH AND FRAGMENTED RECORD DETECTION

      
Numéro d'application US2021071847
Numéro de publication 2023/063970
Statut Délivré - en vigueur
Date de dépôt 2021-10-13
Date de publication 2023-04-20
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Sivaraj, Sunit
  • Cyzio, Marek
  • Patel, Piyush
  • King, Michele
  • Bondugula, Rajkumar

Abrégé

In some aspects, a record-matching computing system for matching records to facilitate database search and fragmented records detection is provided. The record- matching computing system is configured to search for a data record that matches a query record. The record-matching computing system retrieves a reference record from data records and generates multiple identifier attributes for the query record and reference record, including identifier scores and compound scores. Each identifier score measures a degree of matching between the corresponding identifiers in the query record and reference record. A compound score is generated by combining two or more identifier scores. The record-matching computing system applies the identifier attributes to a machine learning model configured to predict a match classification based on input identifier attributes for a pair of data records. The record-matching server can identify the reference records as a match to the query record based on the match classification indicating a match.

Classes IPC  ?

  • G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
  • G06F 16/2458 - Types spéciaux de requêtes, p. ex. requêtes statistiques, requêtes floues ou requêtes distribuées

100.

FRAGMENTED RECORD DETECTION BASED ON RECORDS MATCHING TECHNIQUES

      
Numéro d'application US2021071849
Numéro de publication 2023/063971
Statut Délivré - en vigueur
Date de dépôt 2021-10-13
Date de publication 2023-04-20
Propriétaire EQUIFAX INC. (USA)
Inventeur(s)
  • Sivaraj, Sunit
  • Cyzio, Marek
  • Patel, Piyush
  • King, Michele
  • Bondugula, Rajkumar

Abrégé

In some aspects, a record-matching computing system for detecting fragmented records is provided. The record-matching system is configured to identify a list of candidate records for merging from a set of data records. The record-matching system determines a matching decision for each pair of candidate records in the list and generates a graph. The graph includes nodes representing respective candidate records and edges connecting the nodes. Each edge represents a match between a pair of nodes connected by the edge according to the matching decisions. The record-matching system detects a connected component in the graph from which a qualified connected component is identified based on the minimum connectivity of the qualified connected component. The record-matching system updates the set of data records stored by merging candidate records represented by the nodes in the qualified connected component.

Classes IPC  ?

  • G06F 16/215 - Amélioration de la qualité des donnéesNettoyage des données, p. ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
  • G06F 16/28 - Bases de données caractérisées par leurs modèles, p. ex. des modèles relationnels ou objet
  1     2     3     4        Prochaine page