-
公开(公告)号:US10958583B2
公开(公告)日:2021-03-23
申请号:US16452862
申请日:2019-06-26
发明人: Gilbert Gatchalian , William August Stahlhut , Kamesh R. Gottumukkala , Siten Sanghvi , Stephen T. Shannon , Morgan S. Allen , Christopher L. Rice
IPC分类号: H04L12/851 , H04L12/927 , H04L12/911 , G06Q40/02 , G06Q30/02 , G06Q10/06 , G06Q10/10 , H04L12/859
摘要: This application describes apparatus and methods for using edge-computing to control resource distribution among access channels, such as a retail banking center. Edge-nodes may be configured to move a product display in response to detected or expected customer traffic flow in or near a retail location. Edge-nodes may be configured to redirect resources provided by a cloud computing environment to or away from the retail location. Based on customer traffic flow, edge-nodes may direct customers/resources to a retail location and ensure the retail location provides a predetermined quality of service.
-
公开(公告)号:US10484490B2
公开(公告)日:2019-11-19
申请号:US15725553
申请日:2017-10-05
发明人: Minh N. Vuong , Cameron Darnell Wadley , Susan Varghese , Anna Hollifield , Mohamed A. Gahnoog , Katherine Dintenfass , William August Stahlhut
摘要: Aspects of the disclosure relate to multicomputer processing of data from social media service computing platforms and other sources with centralized event control. An event control computing platform may receive information from one or more social media service computing platforms. Subsequently, the event control computing platform may identify, based on the received information, whether a change should be made to user data associated with a user identifiable by the received information. If the information indicates that a change should be made to the user data, then the event control computing platform may extract metadata from the received information to verify the accuracy of the received information. When the metadata verifies the accuracy of the received information, the event control computing platform may generate a command configured to cause a change to the user data and then may transmit the generated command to an event validation computing platform.
-
公开(公告)号:US10440051B2
公开(公告)日:2019-10-08
申请号:US15448888
申请日:2017-03-03
摘要: Embodiments of the invention are directed to systems, methods and computer program products for enhanced detection of polymorphic malicious content within an entity. In this regard, the present invention receives information associated with an incidence of an electronic file; receives an first hash value of the electronic file from a first network device and a second hash value of the electronic file from a second network device; compares the first hash value with the second hash value; determines that the electronic file is polymorphic based on at least the match; initiates an execution of a quantum optimization algorithm using a quantum optimizer to determine one or more hash value states associated with the electronic file for a third network device; and initiates a control signal configured to store the one or more hash value states in a database associated with the third network device.
-
公开(公告)号:US10437991B2
公开(公告)日:2019-10-08
申请号:US15450729
申请日:2017-03-06
摘要: A system for capturing communication variables associated with a communication between two or more parties and implementing a quantum optimizer to analyze the communication variables to determine the actual context of a communication held by one or more parties to the communication. Once the actual context is determined, a further determination is made as to whether the actual context poses or potentially poses a security threat to one or more parties to the communication or a third-party and, if so, notifies the party of the security threat. In this regard, parties to a communication that are unaware of the actual context of the communication held by another party are made aware of that actual context poses a security threat and, in some embodiments, notifies the parties while the communication is still occurring.
-
公开(公告)号:US20180253552A1
公开(公告)日:2018-09-06
申请号:US15450729
申请日:2017-03-06
CPC分类号: G06F21/554 , G06N10/00 , G10L25/63
摘要: A system for capturing communication variables associated with a communication between two or more parties and implementing a quantum optimizer to analyze the communication variables to determine the actual context of a communication held by one or more parties to the communication. Once the actual context is determined, a further determination is made as to whether the actual context poses or potentially poses a security threat to one or more parties to the communication or a third-party and, if so, notifies the party of the security threat. In this regard, parties to a communication that are unaware of the actual context of the communication held by another party are made aware of that actual context poses a security threat and, in some embodiments, notifies the parties while the communication is still occurring.
-
公开(公告)号:US12034586B2
公开(公告)日:2024-07-09
申请号:US17851151
申请日:2022-06-28
IPC分类号: H04L41/0654 , H04L41/0659 , H04L41/0677 , H04L41/16
CPC分类号: H04L41/0654 , H04L41/0659 , H04L41/0677 , H04L41/16
摘要: A computer system for optimizing an application for monitoring operation of a network is provided. The application may utilize Artificial Intelligence (AI). The computer system may be configured to detect a network transaction volume level that exceeds a first threshold level. In response to a detection of the network transaction volume level that exceeds a first threshold level, the system may utilize the AI to determine whether to implement one or more over-threshold-level mitigation techniques. When the AI instructs the processor to implement the one or more over-threshold-level mitigation techniques, the system may query the AI for an instruction directing an implementation of the over-threshold-level mitigation techniques.
-
公开(公告)号:US20240013208A1
公开(公告)日:2024-01-11
申请号:US17860204
申请日:2022-07-08
CPC分类号: G06Q20/389 , G06Q20/401 , G06Q20/02
摘要: Apparatus and methods for determining transaction transmission fidelity are provided. A sender may receive a transaction log including multiple transactions in two or more rows and two or more columns. The transaction log may be encrypted. Each of the transactions may be tagged. Each row and column of the transaction log may be hashed. The encrypted transaction log and the hash values may be transmitted to a recipient. The recipient may decrypt the transaction log and hash each row and column of the decrypted transaction log. The hash values may be compared and if there is a difference, a report or alert may be generated.
-
48.
公开(公告)号:US11729180B2
公开(公告)日:2023-08-15
申请号:US17557841
申请日:2021-12-21
发明人: Jisoo Lee , John C. Checco , William August Stahlhut , Joseph Castinado , Brad Romano , Suki Ramasamy , Patrick Nicholas Lawrence , Lekha Ananthakrishnan
IPC分类号: H04L9/40 , G06Q20/10 , G06Q10/0631
CPC分类号: H04L63/102 , G06Q10/06315 , G06Q20/10
摘要: Methods and systems for using block chain technology to verify transaction data are described herein. A computing platform may receive data about events related to transactions, personal or corporate information, supply chains, and other relevant information about a person or corporate entity. The event information may be received, aggregated, and processed to determine metadata about the person or corporate entity. The metadata may indicate, for example, a trustworthiness of the person or corporate entity for various purposes. Such event information and/or metadata may be stored as transactions in a block chain that may be accessible by counterparties to a potential transaction involving the person or corporate entity. The automated event processing computing platform may further use automated techniques to implement smart transactions between the person/entity and counterparty based on the trust metadata.
-
49.
公开(公告)号:US20220116401A1
公开(公告)日:2022-04-14
申请号:US17557841
申请日:2021-12-21
发明人: Jisoo Lee , John C. Checco , William August Stahlhut , Joseph Castinado , Brad Romano , Suki Ramasamy , Patrick Nicholas Lawrence , Lekha Ananthakrishnan
摘要: Methods and systems for using block chain technology to verify transaction data are described herein. A computing platform may receive data about events related to transactions, personal or corporate information, supply chains, and other relevant information about a person or corporate entity. The event information may be received, aggregated, and processed to determine metadata about the person or corporate entity. The metadata may indicate, for example, a trustworthiness of the person or corporate entity for various purposes. Such event information and/or metadata may be stored as transactions in a block chain that may be accessible by counterparties to a potential transaction involving the person or corporate entity. The automated event processing computing platform may further use automated techniques to implement smart transactions between the person/entity and counterparty based on the trust metadata.
-
50.
公开(公告)号:US11188909B2
公开(公告)日:2021-11-30
申请号:US16585449
申请日:2019-09-27
发明人: Jisoo Lee , John C. Checco , William August Stahlhut , Joseph Castinado , Brad Romano , Suki Ramasamy , Patrick Nicholas Lawrence , Lekha Ananthakrishnan
摘要: Methods and systems for using block chain technology to verify transaction data are described herein. A computing platform may receive data about events related to transactions, personal or corporate information, supply chains, and other relevant information about a person or corporate entity. The event information may be received, aggregated, and processed to determine metadata about the person or corporate entity. The metadata may indicate, for example, a trustworthiness of the person or corporate entity for various purposes. Such event information and/or metadata may be stored as transactions in a block chain that may be accessible by counterparties to a potential transaction involving the person or corporate entity. The automated event processing computing platform may further use automated techniques to implement smart transactions between the person/entity and counterparty based on the trust metadata.
-
-
-
-
-
-
-
-
-