207 patents
Page 3 of 11
Utility
Right-sizing Resource Requests by Applications In Dynamically Scalable Computing Environments
2 Mar 23
Methods, systems, and techniques for right-sizing resource requests for applications in a dynamically scalable computing environment.
Matthew Stringer, Merissa Li, Kaveh Alemi, Ore Aminu, Venkatesan Packiriswamy, Manoj Agrawal, Vishal Mahajan
Filed: 23 Aug 22
Utility
System and Method for Machine Learning Architecture with Selective Learning
2 Mar 23
Systems, devices, and methods for training an automated agent are disclosed.
Xiao Qi Shi, Hasham Burhani
Filed: 23 Aug 22
Utility
System and Method for Machine Learning Architecture with a Memory Management Module
2 Mar 23
Systems, devices, and methods for training an automated agent are disclosed.
Hasham BURHANI, Xiao Qi SHI, Kiarash JAMALI
Filed: 25 Aug 21
Utility
Dynamic Esg Visualization
2 Mar 23
A method is provided for dynamically visualizing an impact field based on weighted ESG.
Lindsay Puls, Michael Chen, Ori Wiegner, Calla Lu
Filed: 19 Aug 22
Utility
Blockchain Marketplace for Debt Capital
2 Mar 23
A marketplace for trading bonds on the block chain includes a bond token smart contract that tokenizes the bond for buying/selling using a stablecoin.
Tiffany LI, Samuel WELLER, Arsh KOCHAR, Alifiyah HUSSAIN, Endri MANI, Alexander DOMENICK
Filed: 15 Aug 22
Utility
Detection of Phishing Websites Using Machine Learning
2 Mar 23
Salient features are extracted from a training data set.
Syed (Areeb) Akhter, Shivam Pandey, Saira Rizvi, Katarina Chiam, Christian Fowler, Cathal Smyth, Sahar Rahmani, Fariz Huseynli, Arsenii Pustovit, Milos Stojadinovic
Filed: 12 Aug 22
Utility
Systems and Methods for Reinforcement Learning with Supplemented State Data
9 Feb 23
Systems are methods are provided for training an automated agent.
Hasham BURHANI, Xiao Qi SHI
Filed: 9 Aug 21
Utility
Verification of Data Processes In a Network of Computing Resources
9 Feb 23
A method for managing data processes in a network of computing resources includes: receiving at least one child request being routed from an intermediary device to at least one corresponding destination device, the at least one child request requesting execution of at least one corresponding child data process, each of the at least one child data process for executing at least a portion of the at least one parent data process from an instructor device, and each of the at least one child request including a destination key derived at least in part from the at least one instructor key; storing the at least one child request in at least one storage device; modifying the at least one child request upon receiving a child request modification signal; and generating signals for communicating the child requests to one or more requesting devices.
Walter Michael PITIO, Philip IANNACCONE, James BROWN, Stephen Arthur BAIN
Filed: 17 Oct 22
Utility
System and Method for Composite Cryptographic Transactions
26 Jan 23
A composite cryptographic data structure is described, and corresponding methods, systems, and computer readable media.
Karim Talal HAMASNI, Stefan MUELLER, Atilla Murat FIRAT, Matthew Thomas PESKETT
Filed: 7 Oct 22
Utility
System and Method for Duplicating an Application State
26 Jan 23
A computer system and computer-implemented method for duplicating an application state are provided, the method including: recording one or more point-in-time characteristics generated by prior user inputs at one or more user interface elements, the one or more point-in-time characteristics associated with a first application state of a first application instance; transferring the one or more point-in-time characteristics to the provisioned memory resources for generating the second application state; generating a second application instance based on the one or more point-in-time characteristics; configuring the second application state based on the one or more point-in-time characteristics to duplicate the first application state of the first application instance; and storing the prior user inputs in a journal, wherein the journal is configured to enable reproduction of a state of a plurality of modified states of the first application instance.
Philip IANNACCONE, Walter Michael PITIO, James BROWN
Filed: 3 Oct 22
Utility
Systems and Methods for Dynamic Passphrases
22 Dec 22
A technical validation mechanism is described that includes the use of facial feature recognition and tokenization technology operating in combination with machine learning models can be used such that specific facial or auditory characteristics of how an originating script is effectuated can be used to train the machine learning models, which can then be used to validate a video or a particular dynamically generated passphrase by comparing overlapping phonemes or phoneme transitions between the originating script and the dynamically generated passphrase.
Edison U. ORTIZ, Mohammad Abuzar SHAIKH, Margaret Inez SALTER, Sarah Rachel Waigh Yean WILKINSON, Arya POURTABATABAIE, Iustina-Miruna VINTILA, Steven FERNANDES, Sumit Kumar JHA
Filed: 29 Aug 22
Utility
System and Method for Risk Sensitive Reinforcement Learning Architecture
22 Dec 22
A computer-implemented system and method for training an auomated agent are disclosed.
Pablo Francisco HERNANDEZ-LEAL, Yue GAO, Yik Chau LUI
Filed: 10 Jun 22
Utility
System and Method for Multi-user Session for Coordinated Electronic Transactions
15 Dec 22
Systems, methods, and computer readable media are directed in various embodiments for providing multiuser sessions for coordinated electronic transactions.
Arnold BADAL-BADALIAN, Edison U. ORTIZ, William Kwok Hung CHEUNG, Seung Bong BAEK, Ravi KHANDAVILLI
Filed: 14 Jun 22
Utility
Method for Anomaly Detection In Clustered Data Structures
15 Dec 22
A method for generating visual representations of financial interests includes: receiving an input data set including one or more data structures storing data fields and data values representative of financial interests; extracting, from the input data, one or more extracted features from the funds, the extracted features collectively indicative of a distance between different funds; generating one or more clusters of funds, based on the extracted features of the funds; determining, based on identified differences between one or more funds relative to at least one other fund in a corresponding cluster of funds, one or more fund anomalies based on the one or more extracted features; generating one or more adjustment recommendations based on the one or more fund anomalies, the one or more adjustment recommendations representing control instruction sets for automatically modifying characteristics of the corresponding fund.
Morteza MASHAYEKHI, Iman REZAEIAN, Jonathan Albert North ANDERS
Filed: 27 Jun 22
Utility
System and Method for Location-based Token Transaction Processing
8 Dec 22
Systems, methods, and machine-executable data structures for the processing of data for the secure creation, administration, manipulation, processing, and storage of electronic data useful in the processing of electronic payment transactions.
Edison U. ORTIZ, Arnold BADAL-BADALIAN, Ambica Pawan KHANDAVILLI, Rasha KHAYAT, Iustina-Miruna VINTILA, Nikhil Singh SHEKHAWAT
Filed: 6 Jun 22
Utility
System and Method for Anonymous Location Verification
1 Dec 22
A computer implemented system for anonymous electronic verification of location credentials including at least one processor and data storage is described in various embodiments.
Arya POURTABATABAIE, Edison U. ORTIZ, Margaret Inez SALTER
Filed: 6 Jun 22
Utility
System and Method for Adversarial Vulnerability Testing of Machine Learning Models
1 Dec 22
A system and method for adversarial vulnerability testing of machine learning models is proposed that receives as an input, a representation of a non-differentiable machine learning model, transforms the input model into a smoothed model and conducts an adversarial search against the smoothed model to generate an output data value representative of a potential vulnerability to adversarial examples.
Giuseppe Marcello Antonio CASTIGLIONE, Weiguang DING, Sayedmasoud HASHEMI AMROABADI, Ga WU, Christopher Côté SRINIVASA
Filed: 20 May 22
Utility
System and Method for Continuous Dynamics Model from Irregular Time-series Data
1 Dec 22
A system for machine learning architecture for time series data prediction.
Ruizhi DENG, Marcus Anthony BRUBAKER, Gregory Peter MORI, Andreas Steffen Michael LEHRMANN
Filed: 20 May 22
Utility
System and Method for Conditional Marginal Distributions at Flexible Evaluation Horizons
1 Dec 22
The methods and systems are directed to computational approaches for training and using machine learning algorithms to predict the conditional marginal distributions of the position of agents at flexible evaluation horizons and can enables more efficient path planning.
Alexander RADOVIC, Jiawei HE, Janahan Mathuran RAMANAN, Marcus Anthony BRUBAKER, Andreas Steffen Michael LEHRMANN
Filed: 21 May 22
Utility
System and Method for Machine Learning Architecture with Invertible Neural Networks
1 Dec 22
A computer system and method for predicting an output for an input are provided.
Michael PRZYSTUPA, Peter FORSYTH, Daniel RECOSKIE, Andreas Steffen Michael LEHRMANN
Filed: 20 May 22