-
公开(公告)号:US20240275772A1
公开(公告)日:2024-08-15
申请号:US18544149
申请日:2023-12-18
CPC分类号: H04L63/08 , G06Q20/40 , H04L63/0861 , H04L2463/082
摘要: A non-transitory computer-readable storage medium storing computer-readable program code executable by a processor to receive a transaction request from a user interface, and receive a user-identifier from the user interface, and the user-identifier associated with a user. The program code may be executable to send a first non-audible sound signal to initiate a multifactor authentication process during a first interval, and send a second non-audible sound signal during a second interval, where the second non-audible sound signal comprises a predetermined frequency pattern, associated with the user. The program code may also be executable to receive a third non-audible sound signal, where the third non-audible sound signal, at least in part, is utilized to determine whether to complete the transaction request or not. The first non-audible sound signal, the second non-audible sound signal, and the third non-audible sound signal may comprise a frequency greater than 15 kHz.
-
2.
公开(公告)号:US20240265258A1
公开(公告)日:2024-08-08
申请号:US18624439
申请日:2024-04-02
发明人: Reza FARIVAR , Fardin Abdi Taghi ABAD , Anh TRUONG , Mark WATSON , Austin WALTERS , Jeremy GOODSITT , Vincent PHAM
IPC分类号: G06N3/08 , G06F18/24 , G06N3/04 , G06Q20/38 , G06V10/82 , G06V30/19 , G06V30/226 , G06V40/30
CPC分类号: G06N3/08 , G06F18/24 , G06Q20/3825 , G06V10/82 , G06V30/19147 , G06V30/19173 , G06V30/226 , G06V40/33 , G06N3/04
摘要: A device receives information indicating first names and last names of individuals and applies different cursive fonts to each of the first names and the last names to generate images of different cursive first names and different cursive last names. The device applies different transformations to the images of the different cursive first names and the different cursive last names to generate a set of first name images and a set of last name images. The device combines each first name image with each last name image to form a set of signature images and trains a neural network model, with the set of signature images, to generate a trained neural network model. The device receives an image of a signature and processes the image of the signature, with the trained neural network model, to recognize a first name and a last name in the signature.
-
公开(公告)号:US20240256639A1
公开(公告)日:2024-08-01
申请号:US18161837
申请日:2023-01-30
发明人: Jeremy GOODSITT , Christopher WALLACE , Daniele ROSA , Samuel SHARPE , Galen RAFFERTY , Austin WALTERS , Anh TRUONG
CPC分类号: G06F21/1077 , G06F21/602 , G06F21/1015
摘要: Systems and methods for implementing a digital container. In some embodiments, the system determines whether an access code to refresh access provisions for a user with respect to a digital asset was received within a period of time. Based on determining that the access code was not received within the period of time, the system executes one or more modification processes to render at least a portion of the digital asset inaccessible. Subsequent to the period of time elapsing, the system receives the access code to refresh the access provisions for the user with respect to the digital asset. Based on receiving the access code, the system executes one or more restoration processes to reverse the one or more modification processes, thereby restoring the access provisions for the user with respect to the digital asset.
-
公开(公告)号:US20240163280A1
公开(公告)日:2024-05-16
申请号:US18221218
申请日:2023-07-12
发明人: Vincent PHAM , Reza FARIVAR , Jeremy Edward GOODSITT , Fardin ABDI TAGHI ABAD , Anh TRUONG , Kate KEY , Austin Grant WALTERS
CPC分类号: H04L63/0853 , G06Q40/02 , H04L63/0892
摘要: Techniques and apparatus for providing peer-based management of user accounts are described. In one embodiment, for example, an apparatus may include at least one memory and logic coupled to the at least one memory. The logic may be configured to receive a request from at least one first user account to unlock a second user account locked responsive to a fraud event, determine a safe authentication value for the fraud event, and unlock the second user account responsive to the at least one first user account being a safe authentication account and the safe authentication value being over a safe authentication threshold value. Other embodiments are described.
-
公开(公告)号:US20240071045A1
公开(公告)日:2024-02-29
申请号:US17821987
申请日:2022-08-24
发明人: Jeremy GOODSITT , Galen RAFFERTY , Grant EDEN , Anh TRUONG , Austin WALTERS
IPC分类号: G06V10/764 , G06T11/00 , H04L9/32
CPC分类号: G06V10/764 , G06T11/006 , H04L9/32
摘要: Methods and systems described herein relate to authenticating users-based on generating images that have modified features. More specifically, the methods and systems generate these images by processing existing training data to identify a common feature in existing photos that may be modified, and then modifying that feature with the use of generative adversarial networks.
-
公开(公告)号:US20240062289A1
公开(公告)日:2024-02-22
申请号:US17821098
申请日:2022-08-19
发明人: Galen RAFFERTY , Jeremy GOODSITT , Grant EDEN , Samuel SHARPE , Anh TRUONG
CPC分类号: G06Q40/04 , G06Q30/0641
摘要: In some implementations, a system may monitor online activity of a user on a user device and determine that the user is about to perform an imminent interaction associated with a domestic interaction item. The system may identify a domestic interaction amount associated with the domestic interaction item. The system may search one or more international databases for an international interaction item corresponding to the domestic interaction item and based on a prioritized order of international countries associated with the international database(s). The system may determine, based on a currency exchange rate, that an international interaction amount associated with the international interaction item is less than the domestic interaction amount. The system may transmit, to the user device, international interaction item data indicating the international interaction item, the international interaction amount, and an associated international interaction party.
-
公开(公告)号:US20240013781A1
公开(公告)日:2024-01-11
申请号:US17810719
申请日:2022-07-05
发明人: Jeremy GOODSITT , Galen RAFFERTY , Samuel SHARPE , Grant EDEN , Austin WALTERS , Anh TRUONG , Christopher WALLACE
CPC分类号: G10L15/22 , G10L15/18 , G06F9/453 , G10L2015/223 , G10L2015/088
摘要: In some implementations, a recording device may obtain a settings configuration associated with deactivating an audio recording function or an audio processing function of the recording device, wherein the settings configuration indicates one or more deactivation events. The recording device may obtain first audio content associated with the recording device for identifying audio prompts associated with causing the recording device to perform one or more actions. The recording device may detect a deactivation event of the one or more deactivation events. The recording device may refrain from obtaining audio content based on detecting the deactivation event and until an activation event is detected. The recording device may obtain second audio content associated with the recording device based on detecting the activation event.
-
公开(公告)号:US20230367868A1
公开(公告)日:2023-11-16
申请号:US18200315
申请日:2023-05-22
发明人: Reza FARIVAR , Anh TRUONG , Vincent PHAM , Austin Grant WALTERS , Galen RAFFERTY , Jeremy Edward GOODSITT
摘要: Various embodiments are directed to a password security warning system. An artificial neural network or other types of models may be used to determine whether a password that is created, input, or proposed by a user via an interface includes one or more predictable or typical transformations or combinations of characters derived from user-specific information. Based on the determination, a warning may be provided to the user.
-
公开(公告)号:US20230289392A1
公开(公告)日:2023-09-14
申请号:US18318678
申请日:2023-05-16
发明人: Vincent PHAM , Reza FARIVAR , Austin WALTERS , Jeremy GOODSITT , Galen RAFFERTY , Anh TRUONG
IPC分类号: G06F16/9535 , G06F16/955 , H04L67/306 , G06N20/00 , H04L67/02 , G06F16/958
CPC分类号: G06F16/9535 , G06F16/9566 , H04L67/306 , G06N20/00 , H04L67/02 , G06F16/972
摘要: In certain embodiments, reference identifiers may be generated and embedded into a website's content. A request for a reference identifier to be embedded into first content on a first website may be obtained based on a user accessing the first website. Based on the request, interaction data related to the first website may be retrieved indicating that a prior user interacted with text on the first website and subsequently accessed a second website. A reference identifier related to the second website may be caused to be embedded into the text on the first website based on: (i) the second website comprising second content related to the text, (ii) the prior user interacting with the text on the first website, and (iii) the prior user accessing the second website after interacting with the first content on the first website.
-
公开(公告)号:US20230273841A1
公开(公告)日:2023-08-31
申请号:US18312481
申请日:2023-05-04
发明人: Austin WALTERS , Vincent PHAM , Kate KEY , Kenneth TAYLOR , Anh TRUONG , Fardin ABDI TAGHI ABAD , Jeremy GOODSITT
IPC分类号: G06F9/54 , G06N20/00 , G06F17/16 , G06N3/04 , G06F11/36 , G06N3/088 , G06F21/62 , G06N5/04 , G06F17/15 , G06T7/194 , G06T7/254 , G06T7/246 , G06F16/2455 , G06F16/22 , G06F16/28 , G06F16/906 , G06F16/93 , G06F16/903 , G06F16/9038 , G06F16/9032 , G06F16/25 , G06F16/335 , G06F16/242 , G06F16/248 , G06F30/20 , G06F40/166 , G06F40/117 , G06F40/20 , G06F8/71 , G06F17/18 , G06F21/55 , G06F21/60 , G06N7/00 , G06Q10/04 , G06T11/00 , H04L9/40 , H04L67/306 , H04L67/00 , H04N21/234 , H04N21/81 , G06N5/00 , G06N5/02 , G06V30/196 , G06F18/22 , G06F18/23 , G06F18/24 , G06F18/40 , G06F18/213 , G06F18/214 , G06F18/21 , G06F18/20 , G06F18/2115 , G06F18/2411 , G06F18/2415 , G06N3/044 , G06N3/045 , G06N7/01 , G06V30/194 , G06V10/98 , G06V10/70 , G06N3/08
CPC分类号: G06F9/541 , G06N20/00 , G06F17/16 , G06N3/04 , G06F11/3628 , G06N3/088 , G06F21/6254 , G06N5/04 , G06F17/15 , G06F21/6245 , G06T7/194 , G06T7/254 , G06T7/246 , G06T7/248 , G06F16/24568 , G06F16/2237 , G06F16/285 , G06F16/906 , G06F16/93 , G06F16/90335 , G06F16/9038 , G06F16/90332 , G06F16/258 , G06F16/288 , G06F16/283 , G06F16/335 , G06F16/2264 , G06F16/2423 , G06F16/248 , G06F16/254 , G06F30/20 , G06F40/166 , G06F40/117 , G06F40/20 , G06F8/71 , G06F9/54 , G06F9/547 , G06F11/3608 , G06F11/3636 , G06F17/18 , G06F21/552 , G06F21/60 , G06N7/00 , G06Q10/04 , G06T11/001 , H04L63/1416 , H04L63/1491 , H04L67/306 , H04L67/34 , H04N21/23412 , H04N21/8153 , G06N5/00 , G06N5/02 , G06V30/1985 , G06F18/22 , G06F18/23 , G06F18/24 , G06F18/40 , G06F18/213 , G06F18/214 , G06F18/217 , G06F18/285 , G06F18/2115 , G06F18/2148 , G06F18/2193 , G06F18/2411 , G06F18/2415 , G06N3/044 , G06N3/045 , G06N7/01 , G06V30/194 , G06V10/993 , G06V10/768 , G06N3/08 , G06T2207/20084 , G06T2207/10016 , G06T2207/20081
摘要: Systems and methods for generating synthetic video are disclosed. For example, a system may include a memory unit and a processor configured to execute the instructions to perform operations. The operations may include receiving video data, normalizing image frames, generating difference images, and generating an image sequence generator model. The operations may include training an autoencoder model using difference images, the autoencoder comprising an encoder model and a decoder model. The operations may include identifying a seed image frame and generating a seed difference image from the seed image frame. The operations may include generating, by the image sequence generator model, synthetic difference images based on the seed difference image. In some aspects, the operations may include using the decoder model to synthetic normalized image frames from the synthetic difference images. The operations may include generating synthetic video by adding background to the synthetic normalized image frames.
-
-
-
-
-
-
-
-
-