-
公开(公告)号:US11252255B2
公开(公告)日:2022-02-15
申请号:US16448081
申请日:2019-06-21
IPC分类号: H04L29/08
摘要: A method for aggregating outage data via an edge computing system is provided. The method may include transmitting, by each edge-node included in a network, a self-identifying, self-locating, communication. The method may include receiving, at each edge-node included in the network, self-identifying, self-locating, communications from one or more edge-nodes included in the network. The method may include detecting an outage relating to a first edge-node included in the network. The outage may be detected by at least one edge-node included in the network. The at least one edge-node may not be the first edge-node. The at least one edge-node may be the first edge-node operating in limited capacity. The method may include identifying a most-recently confirmed location of an entity co-located with the first edge-node. The method may include dispatching outage-restoration-assistance to the most-recently confirmed real-time location of the entity co-located with the first edge-node.
-
公开(公告)号:US11232445B2
公开(公告)日:2022-01-25
申请号:US16117136
申请日:2018-08-30
发明人: Manu Kurian , Kevin A. Delson
IPC分类号: G06Q20/40
摘要: Systems for dynamic authentication and event processing are provided. In some examples, a system may receive a request to process an event. In response to receiving the request to process the event, the system may transfer an amount of funds associated with the event from a first account of a first user who is a party to the event to a second account. The system may generate a profile for each user who is a party to the event. In some examples, the information in a profile may be anonymized. Users who are parties to the event may use the profiles to authenticate and authorize or cancel the event. In some examples, a notification may be transmitted to the system that the event is authorized for processing. The amount of funds may be transferred from the second account to a third account associated with a second user who is a party to the event. If the event is cancelled, the funds may be transferred from the second, temporary account to the first account. In some examples, after the event has been processed or cancelled, the profiles may be deleted.
-
公开(公告)号:US20200074466A1
公开(公告)日:2020-03-05
申请号:US16117136
申请日:2018-08-30
发明人: Manu Kurian , Kevin A. Delson
IPC分类号: G06Q20/40
摘要: Systems for dynamic authentication and event processing are provided. In some examples, a system may receive a request to process an event. In response to receiving the request to process the event, the system may transfer an amount of funds associated with the event from a first account of a first user who is a party to the event to a second account. The system may generate a profile for each user who is a party to the event. In some examples, the information in a profile may be anonymized. Users who are parties to the event may use the profiles to authenticate and authorize or cancel the event. In some examples, a notification may be transmitted to the system that the event is authorized for processing. The amount of funds may be transferred from the second account to a third account associated with a second user who is a party to the event. If the event is cancelled, the funds may be transferred from the second, temporary account to the first account. In some examples, after the event has been processed or cancelled, the profiles may be deleted.
-
公开(公告)号:US12099435B2
公开(公告)日:2024-09-24
申请号:US18093874
申请日:2023-01-06
发明人: Lalit Dhawan , Swetha Ravi , Kevin A. Delson , Pratap Dande
CPC分类号: G06F11/3612 , G06F11/3664 , G06N20/00
摘要: Bots are typically programmed to automate tasks and provide statistically expected results. However, a bot may malfunction and generate aberrant outputs. It is technically challenging to detect the aberrant outputs and determine whether the outputs are due to an error in how the bot processes inputs or because the bot has received unusual or unexpected input data. Apparatus and methods are provided for auto-determining why a bot has generated output outside expected results. An auto-correct bot will detect problems and auto-identify potential solutions, simulate those solutions and apply those solutions to remediate the malfunctioning bot.
-
公开(公告)号:US20240235982A9
公开(公告)日:2024-07-11
申请号:US17972751
申请日:2022-10-25
发明人: Kevin A. Delson
CPC分类号: H04L45/123 , H04L41/16 , H04L45/26 , H04L45/42
摘要: A system is provided that selectively routes data packets along a secure pathway from a source node to a destination node. The system may avoid target routing devices or regions that may be associated with compromised data security or otherwise be associated with a threshold risk of a data breach. The system may configure intermediary nodes to route data packet over the alternative data routing pathway. The system may formulate a secure header for a data packet that instructs a source node to forward the data packet to a target intermediary node. The secure header may replace a default header of the data packet and direct the data packet from the source node to the target intermediary node.
-
公开(公告)号:US20240232047A1
公开(公告)日:2024-07-11
申请号:US18093874
申请日:2023-01-06
发明人: Lalit Dhawan , Swetha Ravi , Kevin A. Delson , Pratap Dande
IPC分类号: G06F11/36
CPC分类号: G06F11/3612
摘要: Bots are typically programmed to automate tasks and provide statistically expected results. However, a bot may malfunction and generate aberrant outputs. It is technically challenging to detect the aberrant outputs and determine whether the outputs are due to an error in how the bot processes inputs or because the bot has received unusual or unexpected input data. Apparatus and methods are provided for auto-determining why a bot has generated output outside expected results. An auto-correct bot will detect problems and auto-identify potential solutions, simulate those solutions and apply those solutions to remediate the malfunctioning bot.
-
公开(公告)号:US20240113978A1
公开(公告)日:2024-04-04
申请号:US17957854
申请日:2022-09-30
发明人: Amer Ali , Brian Daniel Christman , Kamal D Sharma , Gilbert Gatchalian , Karthik Rajagopalan , Kevin A. Delson , Robert Ronald Rosseland, JR. , Yassine Touahri
IPC分类号: H04L47/2425 , H04L43/16
CPC分类号: H04L47/2425 , H04L43/16
摘要: Systems, computer program products, and methods are described herein for network traffic discovery and routing. The present invention is configured to capture data traffic across network ports in a computing environment; retrieve source code from code repositories; determine that the data traffic and the source code are associated with application programming interface (API) traffic; determine one or more end-point devices associated with the API traffic; determine a first API capable of processing the API traffic, wherein the first API meets supervisory requirements; and transmit a notification to the one or more end-point devices, wherein the notification comprises a recommendation to use the first API to process the API traffic.
-
公开(公告)号:US20240113977A1
公开(公告)日:2024-04-04
申请号:US17957848
申请日:2022-09-30
发明人: Amer Ali , Brian Daniel Christman , Kamal D. Sharma , Gilbert Gatchalian , Karthik Rajagopalan , Kevin A. Delson , Robert Ronald Rosseland, JR. , Yassine Touahri , Jyothishwar Reddy Sama , Zaheeruddin Mohammed
IPC分类号: H04L47/2425 , H04L41/16
CPC分类号: H04L47/2425 , H04L41/16
摘要: Systems, computer program products, and methods are described herein for network traffic discovery and analysis. The present invention is configured to capture data traffic across network ports in a computing environment; retrieve source code from code repositories; determine that the data traffic and the source code are associated with application programming interface (API) traffic; determine a first API associated with the API traffic; determine, using a machine learning (ML) subsystem, whether the first API meets supervisory requirements; and invoke a remediation protocol in an instance when the first API does not meet supervisory requirements.
-
公开(公告)号:US11699188B2
公开(公告)日:2023-07-11
申请号:US17401501
申请日:2021-08-13
IPC分类号: G06Q40/04 , G06Q20/10 , G06F16/951 , G06Q30/0601
CPC分类号: G06Q40/04 , G06F16/951 , G06Q20/108 , G06Q30/0641
摘要: A computing system includes a first computing platform and a virtual exchange computing platform, where the first computing platform provides an application and a first electronic value token and the virtual exchange computing platform is communicatively coupled to the first computing platform. The virtual exchange computing platform receives the information corresponding to the first electronic value token and calculates, via API functions linking to banking as a service (BaaS) functionality processed by a valuation computing platform, a valuation of the first electronic value token. The virtual exchange computing platform causes presentation, via a network and on a first user device, a user interface screen presenting a visualization of a value of the electronic value token and comprising an input and triggers, based on a received trade input from the user interface, a virtual exchange of value involving the first electronic value token.
-
30.
公开(公告)号:US11651373B2
公开(公告)日:2023-05-16
申请号:US16448076
申请日:2019-06-21
CPC分类号: G06Q20/4016 , G06F16/1805 , H04L9/0643 , H04L67/01 , H04L9/50
摘要: A bottom-up hierarchical computer network architecture is provided. The architecture may include a central server. The architecture may also include a plurality of edge nodes that may be coupled to the central server. At least a first one of the edge nodes may be configured to process a transaction, compile data associated with the transaction, and store the data as a master dataset in the first edge node. The architecture may also include a data administration module. The data administration module may be configured to compare the master dataset in the first edge node to transactional data in the central server. When the transactional data in the central server is inconsistent with the master dataset in the first edge node, the data administration module may be configured to update the transactional data in the central server to be consistent with the master dataset in the first edge node.
-
-
-
-
-
-
-
-
-