System for Predicting Memory Resources and Scheduling Jobs in Service-Oriented Architectures

    公开(公告)号:US20230281043A1

    公开(公告)日:2023-09-07

    申请号:US17686162

    申请日:2022-03-03

    CPC classification number: G06F9/5016 G06F9/5022 G06F11/3037 G06N20/00

    Abstract: A system receives job requests comprising associated job names and associated job parameters. The system performs a comparison of a job name and parameters for a first, second, and third job request with information of previously performed jobs and determines a first, second, and third amount of memory to perform the job requests. The system evaluates the first, second, and third amounts of memory with predetermined memory sizes to determine if the memory amounts exceed the predetermined memory sizes. The system negotiates with schedulers from one or more service provider networks to allocate memory from temporary memories for each amount of memory that exceeds the predetermined memory sizes. The system creates a prioritized queue comprising the first, second, and third received job requests for scheduler processing based upon the amounts of memory. The system can use a trained algorithmic model to predict the first, second, and third amounts of memories.

    System and method for secure database management

    公开(公告)号:US12287900B2

    公开(公告)日:2025-04-29

    申请号:US18448865

    申请日:2023-08-11

    Abstract: A method includes encrypting a request received from a user device to generate an encrypted request. Encrypted data items are searched based on the encrypted request to identify desired encrypted data items. In response to determining that two or more encrypted data items of the desired encrypted data items have a same interaction identification, the two or more encrypted data items are locked and masked, and the masked two or more encrypted data items are removed. Algebraic operations are determined based on the encrypted request. An encrypted response is determined by performing the algebraic operations on the desired encrypted data items. The encrypted response is decrypted to obtain a decrypted response. An error is determined due to the algebraic operations performed on the desired encrypted data items. In response to determining that the error is less than an error threshold, the decrypted response is sent to the user device.

    SYSTEM AND METHOD FOR GENERATING DATA MODELS SECURE FROM MALFEASANT MANIPULATION FOR USE IN PREDICTIVE MODELING

    公开(公告)号:US20250111042A1

    公开(公告)日:2025-04-03

    申请号:US18376298

    申请日:2023-10-03

    Abstract: Embodiments of the present invention provide a system for generating data models secure from malfeasant manipulation for use in predictive modeling. The system is configured for retrieving training data associated with predictive modeling from a data source, processing the training data retrieved from the data source, transmitting the training data to a local linear model to generate a predictive output, retrieving historical data from the data source, transmitting the predictive output from the local linear model and the historical data retrieved from the data source to a Huber loss estimator module, validating, via the Huber loss estimator module, the predictive output received from the local linear model based on the historical data retrieved from the data source, and determining, via the Huber loss estimator module, if the training data has been manipulated by a malfeasant actor based on validating the one or more data points associated with the predictive output.

    System and method for secure database management

    公开(公告)号:US20250053678A1

    公开(公告)日:2025-02-13

    申请号:US18448865

    申请日:2023-08-11

    Abstract: A method includes encrypting a request received from a user device to generate an encrypted request. Encrypted data items are searched based on the encrypted request to identify desired encrypted data items. In response to determining that two or more encrypted data items of the desired encrypted data items have a same interaction identification, the two or more encrypted data items are locked and masked, and the masked two or more encrypted data items are removed. Algebraic operations are determined based on the encrypted request. An encrypted response is determined by performing the algebraic operations on the desired encrypted data items. The encrypted response is decrypted to obtain a decrypted response. An error is determined due to the algebraic operations performed on the desired encrypted data items. In response to determining that the error is less than an error threshold, the decrypted response is sent to the user device.

    DETECTING SUSPICIOUS ACTIVITY USING A HASHCHAIN COMPARATOR AND SYNTHETIC DNA METADATA

    公开(公告)号:US20240378614A1

    公开(公告)日:2024-11-14

    申请号:US18144353

    申请日:2023-05-08

    Abstract: Aspects of the disclosure relate to a dual-system reconciliation process of trades. A first real-time trade processing and centralized reconciliation engine may continuously process trades in real-time and may perform centralized reconciliation of the trades. An anomaly detection and reconciliation mesh analysis engine may tokenize trade metadata received from the first real-time trade processing and centralized reconciliation engine, generate tokenized trade digital DNA, generate hashed tokenized trade digital DNA, evaluate and validate the hashed data, and perform decentralized reconciliation mesh analysis of the hashed data using a reconciliation mesh. The anomaly detection and reconciliation mesh analysis engine may send one or more monitory policies from the reconciliation mesh to a user device and may receive a first monitory policy selection from the user device. The anomaly detection and reconciliation mesh analysis engine may update the decentralized reconciliation mesh based on the first monitory policy selection.

    Cloud Infrastructure Using Machine Learning and Non-Fungible Tokens (NFT) for Enhanced Security

    公开(公告)号:US20240362368A1

    公开(公告)日:2024-10-31

    申请号:US18140828

    申请日:2023-04-28

    CPC classification number: G06F21/64 H04L67/1097

    Abstract: A computing platform may train, using historical information classification information, an information classification model, which may configure the information classification model to classify information and identify, based on the classification, a storage location. The computing platform may receive, from a user device, a request to store information. The computing platform may identify, using the information classification model, a cloud based storage location for the information. The computing platform may generate an NFT representative of the first cloud based storage location. The computing platform may direct a cloud based storage system to store the information at the cloud based storage location. The computing platform may send, to the user device, the NFT. The computing platform may receive, from the user device, the NFT and a request to access the information. Based on validating the NFT, the computing platform may grant the user device access to the information.

    DISTRIBUTED EVALUATION PLATFORM FOR NONFUNGIBLE TOKENS USING VIRTUAL TOKEN CLONING

    公开(公告)号:US20240161109A1

    公开(公告)日:2024-05-16

    申请号:US17985239

    申请日:2022-11-11

    CPC classification number: G06Q20/401 G06N20/00 G06Q2220/00

    Abstract: Aspects of the disclosure relate to a distributed evaluation platform. The distributed evaluation platform may train a machine learning model based on historical nonfungible tokens. The distributed evaluation platform may receive client information from a client device. The distributed evaluation platform may generate NFTs corresponding to the client information. The distributed evaluation platform may generate soft tokens corresponding to each NFT. The distributed evaluation platform may apply test cases to the soft tokens. The distributed evaluation platform may generate remedial tokens based on the soft tokens and remediation actions. The distributed evaluation platform may apply the test cases to the remedial tokens. The distributed evaluation platform may overwrite the NFTs using the remedial tokens. The distributed evaluation platform may send an event processing request to an event processing system. The distributed evaluation platform may refine the machine learning model based on the NFTs.

    Generating Synthetic Invisible Fingerprints for Metadata Security and Document Verification Using Generative Artifical Intelligence

    公开(公告)号:US20240031159A1

    公开(公告)日:2024-01-25

    申请号:US17869190

    申请日:2022-07-20

    CPC classification number: H04L9/3231 H04L9/0852 H04L9/50 G06N20/00

    Abstract: Aspects of the disclosure relate to generating synthetic invisible fingerprints for metadata security and document verification using generative artificial intelligence (AI). A computing platform may capture first fingerprint information via a computing device. The first fingerprint information may include one or more physical fingerprint images of a user. The computing platform may encode the first fingerprint information in accordance with a quantum key distribution scheme. The computing platform may store the encoded first fingerprint information in a data store. Based on the encoded first fingerprint information and using a generative artificial intelligence algorithm, the computing platform may generate second fingerprint information. The second fingerprint information may include one or more synthetic fingerprint images associated with the one or more physical fingerprint images of a user. The computing platform may transmit the second fingerprint information for smart contract generation.

Patent Agency Ranking