-
公开(公告)号:US11983710B2
公开(公告)日:2024-05-14
申请号:US17860204
申请日:2022-07-08
CPC分类号: G06Q20/389 , G06Q20/02 , G06Q20/401
摘要: Apparatus and methods for determining transaction transmission fidelity are provided. A sender may receive a transaction log including multiple transactions in two or more rows and two or more columns. The transaction log may be encrypted. Each of the transactions may be tagged. Each row and column of the transaction log may be hashed. The encrypted transaction log and the hash values may be transmitted to a recipient. The recipient may decrypt the transaction log and hash each row and column of the decrypted transaction log. The hash values may be compared and if there is a difference, a report or alert may be generated.
-
公开(公告)号:US11797388B1
公开(公告)日:2023-10-24
申请号:US17859293
申请日:2022-07-07
CPC分类号: G06F11/1415 , G06F11/0754 , G06F11/0793 , G06F11/142 , G06F11/1458 , G06F11/1658 , G06F11/2028 , G06F11/2033 , G06F11/2082 , G06F11/2289 , G06F11/261 , G06F2201/805
摘要: Systems and methods for lossless restoration of a digital system are provided. A method may include creating a digital twin of the digital system. Creating the digital twin may include constructing a digital model that replicates hardware and software components and performance metrics of the digital system. The components and the performance metrics may be detected via a plurality of edge devices. The digital model may be configured to be run on a processor to simulate performance of the digital system. The method may include receiving an indication that the digital system is disconnected from a central server, syncing the digital twin with the digital system while the digital system is disconnected from the central server, and, in response to an indication that the digital system has reconnected with the central server, syncing the central server with the digital twin.
-
公开(公告)号:US11777870B1
公开(公告)日:2023-10-03
申请号:US17860149
申请日:2022-07-08
发明人: Naga Vamsi Krishna Akkapeddi , Maharaj Mukherjee , George Albero , William August Stahlhut , Manu Kurian , Kevin A. Delson
IPC分类号: G06N20/00 , G06F16/27 , H04L29/06 , H04L47/783 , H04L47/762 , H04L47/70
CPC分类号: H04L47/783 , H04L47/762 , H04L47/823
摘要: Systems and methods for maximizing resource utilization in a digital communication system are provided. A method may include receiving a direction for a first one of a plurality of edge devices to execute a task, wherein the edge devices communicate with each other and with a central server via a communication network. The central server may be operated by an entity that is independent of the communication network. The plurality of edge devices may each include an authenticated software application that is provided by the entity. The method may also include calculating, via the ML engine for each of the plurality of edge devices, a predicted resource availability score, and distributing, via the central server, the task among the plurality of edge devices based on the predicted resource availability scores.
-
公开(公告)号:US11657295B2
公开(公告)日:2023-05-23
申请号:US16836317
申请日:2020-03-31
CPC分类号: G06N5/02 , G06F9/542 , G06N5/04 , G06Q20/401 , G06Q20/407 , H04L63/08 , G06Q2220/00 , H04L2463/082 , H04L2463/102
摘要: Systems for using cognitive automation techniques to detect unauthorized events are provided. In some examples, a request for a product or service (e.g., event processing) may be received. The request may be received electronically, via a telephone communication, in person, or the like. The request may be analyzed (e.g., using a cognitive automation model) to determine whether it is potentially unauthorized. If so, one or more requests for additional information may be generated or identified. For instance, requests for authentication information, responses to questions or a series of questions, or the like, may be generated. In some examples, the additional information requested may be identified using the cognitive automation model. Responses to the request for additional information may be analyzed (e.g., using the cognitive automation model) to determine whether the request for the product or service is unauthorized. If so, processing the request may be prevented.
-
公开(公告)号:US11265326B2
公开(公告)日:2022-03-01
申请号:US16581870
申请日:2019-09-25
发明人: Jisoo Lee , John C. Checco , William August Stahlhut , Joseph Castinado , Brad Romano , Suki Ramasamy , Patrick Nicholas Lawrence , Lekha Ananthakrishnan
摘要: Methods and systems for using block chain technology to verify transaction data are described herein. A computing platform may receive data about events related to transactions, personal or corporate information, supply chains, and other relevant information about a person or corporate entity. The event information may be received, aggregated, and processed to determine metadata about the person or corporate entity. The metadata may indicate, for example, a trustworthiness of the person or corporate entity for various purposes. Such event information and/or metadata may be stored as transactions in a block chain that may be accessible by counterparties to a potential transaction involving the person or corporate entity. The automated event processing computing platform may further use automated techniques to implement smart transactions between the person/entity and counterparty based on the trust metadata.
-
公开(公告)号:US20220030000A1
公开(公告)日:2022-01-27
申请号:US17494035
申请日:2021-10-05
发明人: Jisoo Lee , John C. Checco , William August Stahlhut , Joseph Castinado , Brad Romano , Suki Ramasamy , Patrick N. Lawrence , Lekha Ananthakrishnan
摘要: Methods and systems for using block chain technology to verify transaction data are described herein. A computing platform may receive data about events related to transactions, personal or corporate information, supply chains, and other relevant information about a person or corporate entity. The event information may be received, aggregated, and processed to determine metadata about the person or corporate entity. The metadata may indicate, for example, a trustworthiness of the person or corporate entity for various purposes. Such event information and/or metadata may be stored as transactions in a block chain that may be accessible by counterparties to a potential transaction involving the person or corporate entity. The automated event processing computing platform may further use automated techniques to implement smart transactions between the person/entity and counterparty based on the trust metadata.
-
公开(公告)号:US11172366B2
公开(公告)日:2021-11-09
申请号:US16446775
申请日:2019-06-20
摘要: A system for exchanging authentication data between edge-nodes is provided. The system may include an edge-node network. The network may include a plurality of edge-nodes. Each edge-node may include a pairing module. Each pairing module may receive an instruction to pair with another edge-node. Each pairing module pair with another edge-node. The pairing module may continually transmit verification communications to other edge-nodes. The pairing module may continually discover responsive communications from other edge-nodes. The pairing module may continually receive responsive verification communications from other edge-nodes. Each edge-node may include an executable module. The executable module may determine occurrence of an event. Upon determination of the occurrence of an event, the executable module may analyze a stored event protocol. The protocol including an algorithm for implementing executables in response to an event. The executable module may determine an executable based on the algorithm, and execute the determined executable.
-
公开(公告)号:US20190114575A1
公开(公告)日:2019-04-18
申请号:US15783767
申请日:2017-10-13
发明人: Mohamed A. Gahnoog , Cameron Darnell Wadley , Minh N. Vuong , Susan Varghese , Katherine Dintenfass , William August Stahlhut
摘要: Aspects of the disclosure relate to systems and methods for supervision of objectives and verification of completion of tasks associated with objectives. A computing platform may determine an objective and a series of tasks associated with that objective. Completion of the series of tasks may contribute to that objective by effecting a change to user data. The system may verify that a task has been completed by receiving task completion progress information, and effect a change to user data to reflect the task completion. The tasks associated with objectives may be determined or altered by a machine learning engine of the first computing platform.
-
公开(公告)号:US20190109913A1
公开(公告)日:2019-04-11
申请号:US15725553
申请日:2017-10-05
发明人: Minh N. Vuong , Cameron Darnell Wadley , Susan Varghese , Anna Hollifield , Mohamed A. Gahnoog , Katherine Dintenfass , William August Stahlhut
摘要: Aspects of the disclosure relate to multicomputer processing of data from social media service computing platforms and other sources with centralized event control. An event control computing platform may receive information from one or more social media service computing platforms. Subsequently, the event control computing platform may identify, based on the received information, whether a change should be made to user data associated with a user identifiable by the received information. If the information indicates that a change should be made to the user data, then the event control computing platform may extract metadata from the received information to verify the accuracy of the received information. When the metadata verifies the accuracy of the received information, the event control computing platform may generate a command configured to cause a change to the user data and then may transmit the generated command to an event validation computing platform.
-
10.
公开(公告)号:US20180255000A1
公开(公告)日:2018-09-06
申请号:US15449334
申请日:2017-03-03
IPC分类号: H04L12/911
CPC分类号: H04L47/823
摘要: A system for providing resource distribution channels based on predicting future resource distributions typically includes a classical computer apparatus and a quantum optimizer in communication with the classical computer apparatus. The classical computer apparatus identifies resource transfer information related to a resource transfer of a user, wherein the user receives a resource collection as a result of the resource transfer. The quantum optimizer analyzes the resource transfer information to predict a future resource distribution of the resource collection. The classical computer apparatus then compares attributes of the future resource distribution to attributes of multiple resource distribution channels, identifies a resource distribution channel having attributes corresponding to the attributes of the future resource distribution, and transmits a command configured to cause a client application stored on a device of the user to display an interface having a selectable option for transferring the resource collection using the resource distribution channel.
-
-
-
-
-
-
-
-
-