TECHNIQUES FOR PREDICTION MODELS USING TIME SERIES DATA

    公开(公告)号:US20240195677A1

    公开(公告)日:2024-06-13

    申请号:US18415258

    申请日:2024-01-17

    申请人: EQUIFAX INC.

    发明人: Xiao HUANG Yan WANG

    摘要: Various aspects involve a lagged prediction model trained for risk assessment or other purposes. For instance, a risk assessment computing system receives a risk assessment query for a target entity and provides an input predictor record for the target entity to a lagged prediction model. The input predictor record includes a first group of lagged values from a first time-series attribute associated with the target entity. The lagged prediction model is trained by implementing a group feature selection technique configured to select the first time-series attribute as input and to deselect a second time-series attribute associated with the target entity. The risk assessment computing system computes an output risk indicator from the input predictor record and transmits the output risk indicator to a remote computing system. The output risk indicator can be used to control access by the target entity to one or more interactive computing environments.

    AUTOMATED PATH-BASED RECOMMENDATION FOR RISK MITIGATION

    公开(公告)号:US20240185158A1

    公开(公告)日:2024-06-06

    申请号:US18402921

    申请日:2024-01-03

    申请人: EQUIFAX INC.

    IPC分类号: G06Q10/0635

    CPC分类号: G06Q10/0635 G06Q40/03

    摘要: Systems and methods for automated path-based recommendation for risk mitigation are provided. An entity assessment server, responsive to a request for a recommendation for modifying a current risk assessment score of an entity to a target risk assessment score, accesses an input attribute vector for the entity and clusters of entities defined by historical attribute vectors. The entity assessment server assigns the input attribute vector to a particular cluster and determines a requirement on movement from a first point to a second point in a multi-dimensional space based on the statistics computed from the particular cluster. The first point corresponds to the current risk assessment score and the second point corresponds to the target risk assessment score. The entity assessment server computes an attribute-change vector so that a path defined by the attribute-change vector complies with the requirement and generates the recommendation from the attribute-change vector.

    Automated path-based recommendation for risk mitigation

    公开(公告)号:US11900294B2

    公开(公告)日:2024-02-13

    申请号:US17753122

    申请日:2020-08-19

    申请人: EQUIFAX INC.

    CPC分类号: G06Q10/0635 G06Q40/03

    摘要: Systems and methods for automated path-based recommendation for risk mitigation are provided. An entity assessment server, responsive to a request for a recommendation for modifying a current risk assessment score of an entity to a target nsk assessment score, accesses an input attribute vector for the entity and clusters of entities defined by historical attribute vectors. The entity assessment server assigns the input attribute vector to a particular cluster and determines a requirement on movement from a first point to a second point in a multi-dimensional space based on the statistics computed from the particular cluster. The first point corresponds to the current risk assessment score and the second point corresponds to the target risk assessment score. The entity assessment server computes an attribute-change vector so that a path defined by the attribute-change vector complies with the requirement and generates the recommendation from the attribute-change vector.

    CONSTRUCTING EXECUTABLE PROGRAM CODE BASED ON SEQUENCE CODES

    公开(公告)号:US20230418570A1

    公开(公告)日:2023-12-28

    申请号:US18253466

    申请日:2021-11-22

    申请人: EQUIFAX INC.

    IPC分类号: G06F8/34 G06F9/451

    CPC分类号: G06F8/34 G06F9/451

    摘要: Methods described herein generate executable program code based on sequence codes, such that the executable program code is executable by a computer processor. According to such a method, a command is received to generate executable program code. Via a code-building interface, user input is received indicating an operation to be performed by the executable program code, a data type for to the executable program code, and a condition for applying the executable program code. A sequence code is constructed to represent the user input, where the sequence code includes a sequence of character sets. From the sequence code, a first character set corresponding to the operation, a second character set corresponding to the data type, and a third character set corresponding to the condition are extracted. Mapping data is applied to the first character set, the second character set, and the third character set to generate the executable program code.

    VERIFICATION OF ACCESS TO SECURED ELECTRONIC RESOURCES

    公开(公告)号:US20230376585A1

    公开(公告)日:2023-11-23

    申请号:US18364926

    申请日:2023-08-03

    申请人: EQUIFAX INC.

    发明人: Kenneth ALLEN

    IPC分类号: G06F21/44 G06F21/31 G06N5/01

    摘要: Aspects and examples are disclosed for improving multi-factor authentication techniques to control access to secured electronic resources. In one example, a decisioning computer system evaluates, based on a passive-dimension decision process, an access request, received from a user device, for a secured electronic resource. The passive-dimension decision process can evaluate dimensions associated with the access request, such as identity or device characteristics, to determine whether the dimensions of the access request are outside of norms for the user. Based on the passive-dimension decision model, the decisioning computing device may communicate to the user device an access decision, the access decision describing one or more of an access authorization, a denial of access, or a supplemental authentication challenge.

    DEVICE-AGNOSTIC ACCESS CONTROL TECHNIQUES
    9.
    发明公开

    公开(公告)号:US20230319036A1

    公开(公告)日:2023-10-05

    申请号:US17657055

    申请日:2022-03-29

    申请人: EQUIFAX INC.

    IPC分类号: H04L9/40 G06K9/62

    摘要: A system can efficiently control access to an interactive computing environment. The system can receive authentication data of an authentication attempt associated with an entity. The system can determine, for the entity, a historical vector including features that include sub-features. The historical vector can be determined by generating synthetic data, generating weights, and determining probabilities. The synthetic data can be based on historical authentication attempts by entities other than the entity. The weights can correspond to sub-features of the historical vector. The probabilities can indicate a likelihood that a corresponding sub-feature is involved in the authentication attempt. The system can compare the historical vector to the authentication data. The system can generate a responsive message based on the comparison for controlling access to the interactive computing environment.