Real Time Channel Affinity Derivation

    公开(公告)号:US20250124454A1

    公开(公告)日:2025-04-17

    申请号:US18380791

    申请日:2023-10-17

    Abstract: Systems and methods are disclosed for real time, frictionless channel switching to map and transpose a transaction on a preferred channel from an incoming channel. The systems and methods may use a machine learning model that processes features from a plurality of channels to determine the preferred channel. An omni channel processor is used to determine intended functionality data of the transaction for the preferred channel. The systems and methods may generate transposed intent data based on the intended functionality data of the transaction for the preferred channel. A deep link is generated and embedded with the transposed intent data and a channel access token for the transaction on the preferred channel. The deep link is configured to access and complete the requested transaction on the preferred channel.

    Anomaly detection from network traffic
    2.
    发明公开

    公开(公告)号:US20240356944A1

    公开(公告)日:2024-10-24

    申请号:US18302122

    申请日:2023-04-18

    CPC classification number: H04L63/1425 H04L63/1441

    Abstract: A system receives a set of input data streams from different data sources. At least one of the set of input data streams comprises a message that indicates an anomaly with respect to a topic associated with a software application. The system determines the topic, the anomaly, and a set of metadata associated with the topic from the set of input data streams. The set of metadata comprises an occurrence frequency of the anomaly in messages, a number of data sources from which messages are received, or a timeframe window within which the messages are received. The system assigns a set of weight values to the set of metadata and determines an accumulated weight value. If it is determined that the accumulated weight value is more than a threshold weight value, the system communicates an alert indicating to execute a countermeasure action that addresses the anomalous topic.

    Source code validation based on converting the source code to a non-programming language

    公开(公告)号:US20240241705A1

    公开(公告)日:2024-07-18

    申请号:US18156004

    申请日:2023-01-18

    CPC classification number: G06F8/51 G06F8/42

    Abstract: A system identifies data objects from a first piece of code in an original programming language and creates a knowledge graph that represents a relationship among the data objects. The system identifies an expression syntax in the first piece of code and determines an interpretation of the expression syntax. The system creates a sentence that indicates an interpretation of a respective code line. The system determines a counterpart data object in a target programming language for each word in the created sentence. In response, the system creates a second piece of code in the target programming language, such that the second price of code satisfies syntax rules in the target programming language. In response to determining that the second piece of code is configured to perform a particular task that the first piece of code is configured to, the system executes the second piece of code.

    Source code validation based on converting the source code to a non-programming language

    公开(公告)号:US12124828B2

    公开(公告)日:2024-10-22

    申请号:US18156004

    申请日:2023-01-18

    CPC classification number: G06F8/51 G06F8/42

    Abstract: A system identifies data objects from a first piece of code in an original programming language and creates a knowledge graph that represents a relationship among the data objects. The system identifies an expression syntax in the first piece of code and determines an interpretation of the expression syntax. The system creates a sentence that indicates an interpretation of a respective code line. The system determines a counterpart data object in a target programming language for each word in the created sentence. In response, the system creates a second piece of code in the target programming language, such that the second price of code satisfies syntax rules in the target programming language. In response to determining that the second piece of code is configured to perform a particular task that the first piece of code is configured to, the system executes the second piece of code.

    SYSTEM FOR USER-INITIATED AUTHENTICATION OF AN ELECTRONIC COMMUNICATION CHANNEL USING A SECURE COMPUTING APPLICATION TOKEN

    公开(公告)号:US20240195802A1

    公开(公告)日:2024-06-13

    申请号:US18080292

    申请日:2022-12-13

    CPC classification number: H04L63/083

    Abstract: A system is provided for user-initiated authentication of an electronic communication channel using a secure computing application token. In particular, the system may comprise a token generation application installed on an endpoint device of a user, where the application may be configured to perform authentication of communication channels based on receiving user input. Upon receiving a request to establish a secure communication channel from a remote device, the endpoint device may receive a voice sample from the user. Based on the attributes of the voice sample and of the application session, the endpoint device may generate an alphanumeric character string that may serve as a secure token to be verified against a second character string received from the remote device. If a match is detected, the endpoint device may authenticate and generate the communication channel.

Patent Agency Ranking