-
公开(公告)号:US20230275889A1
公开(公告)日:2023-08-31
申请号:US17652602
申请日:2022-02-25
发明人: Jennifer KWOK , Salik SHAH , Zviad AZNAURASHVILI
IPC分类号: H04L9/40
CPC分类号: H04L63/083 , H04L63/107
摘要: In some implementations, a front-end device may receive, from a brain-machine interface (BMI) associated with a user, a request to authenticate the user with secret information associated with the user. Accordingly, the front-end device may transmit, to the BMI, a request for an identifier associated with one or more hardware components of the BMI. The front-end device may receive, from the BMI, an indication of the identifier associated with the one or more hardware components. Accordingly, the front-end device may authenticate the user based on the secret information associated with the user and the identifier associated with the one or more hardware components. Additionally, or alternatively, the front-end device may authenticate the user based on a location of an external device associated with the user and/or an indication of a biometric property associated with the user.
-
公开(公告)号:US20240311456A1
公开(公告)日:2024-09-19
申请号:US18122628
申请日:2023-03-16
发明人: Jennifer KWOK , Phoebe ATKINS , Viraj CHAUDHARY , Leeyat Bracha TESSLER , Tyler MAIMAN , Ray CHENG , Vyjayanthi VADREVU , Michael SAIA
IPC分类号: G06F21/32
CPC分类号: G06F21/32
摘要: The present embodiments disclose systems and methods for authenticating a user with behavioral biometrics associated with a card. The card includes an accelerometer configured to measure the orientation of the card body. The system includes the card and a software application. The software application generates a user profile based on observed card biometrics, then determines whether a recent transaction significantly deviates from the profile.
-
3.
公开(公告)号:US20240056511A1
公开(公告)日:2024-02-15
申请号:US17888189
申请日:2022-08-15
发明人: Jason ZWIERZYNSKI , Sara Rose BRODSKY , Jennifer KWOK , Joshua EDWARDS , Abhay DONTHI , Tania CRUZ MORALES
IPC分类号: H04L67/55 , H04L41/0654 , H04L67/54 , H04L9/40
CPC分类号: H04L67/55 , H04L41/0654 , H04L67/54 , H04L63/0815
摘要: Systems and methods for detecting and repairing loss of a primary digital communication channel may include a server and a user device. The server may be configured to send a push notification to an application of the user device over a network, receive, in response to the sending of the push notification, push notification status data, apply a predictive model to determine whether the primary digital communication channel has failed based on the push notification and the push notification status data; and transmit, upon a determination that the primary digital communication channel has failed, a communication to the user over one or more alternative digital communication channels.
-
公开(公告)号:US20240232890A9
公开(公告)日:2024-07-11
申请号:US18049092
申请日:2022-10-24
发明人: Jennifer KWOK , Sara Rose BRODSKY , Jason ZWIERZYNSKI , Joshua EDWARDS , Abhay DONTHI , Tania Cruz MORALES
CPC分类号: G06Q20/4016 , G06Q20/382
摘要: Systems and methods for external account authentication are disclosed herein. They include receiving a call to pair the external account with a secure account, extracting external data from the external account, the external data corresponding to external account content, providing user activity data from the secure account as an input to an authentication machine learning model, providing the external data as an input to the authentication machine learning model, the authentication machine learning model configured to output a certainty level that the external account is associated with a user of the secure account based on the external data and the activity data, receiving the certainty level from the authentication machine learning model, determining that the certainty level meets a certainty threshold, and pairing the external account with the secure account based on determining that the certainty level meets the certainty threshold.
-
公开(公告)号:US20240036928A1
公开(公告)日:2024-02-01
申请号:US17815142
申请日:2022-07-26
发明人: Abhay DONTHI , Tania CRUZ MORALES , Jason ZWIERZYNSKI , Joshua EDWARDS , Jennifer KWOK , Sara Rose BRODSKY
CPC分类号: G06F9/5033 , G06N20/20
摘要: Embodiments described herein reduce resource insufficiency of a resource source despite inconsistent resource accumulation at the resource source. For example, a request frequency may be determined to define times at which the resource source is predicted to be sufficient despite the inconsistent accumulation or influx. In one use case, with respect to a distributed computing environment having computing resource source(s)/pool(s), a requesting system may identify a machine learning model trained to generate predictions for a resource source at which inconsistent resource accumulation occurs. The system may obtain accumulation data that describes accumulation events at which resources were made available at the resource source. Using the accumulation data with the machine learning model, the system may determine a request frequency for a request type based on predicted times at which a threshold amount of resources is available at the resource source and may request resources in accordance with the request frequency.
-
6.
公开(公告)号:US20230362298A1
公开(公告)日:2023-11-09
申请号:US17661776
申请日:2022-05-03
发明人: Jennifer KWOK , Dwij TRIVEDI , Abhay DONTHI , Leeyat Bracha TESSLER , Salik SHAH
CPC分类号: H04M3/382 , H04M3/42034 , H04M2203/60
摘要: A computer-implemented method for authenticating a source of a telephone call to a recipient of the telephone call may include receiving, prior to receiving the telephone call, a request to input first authentication information. The first authentication information may include a passcode or a selection of a security question. The method may include receiving input of the first authentication information and sending, by the user device, the first authentication information to a computing device associated with the source of the telephone call. The method may include receiving the telephone call from the source and receiving input from the recipient of the telephone call to answer the telephone call. The method may include receiving second authentication information from the computing device, where the second authentication information may include the passcode or an answer to the security question. The method may include outputting the second authentication information.
-
公开(公告)号:US20240171474A1
公开(公告)日:2024-05-23
申请号:US18056902
申请日:2022-11-18
IPC分类号: H04L41/16 , G06N5/022 , H04L41/0654
CPC分类号: H04L41/16 , G06N5/022 , H04L41/0654
摘要: In some aspects, a computing system may use machine learning to determine whether a control is faulty or generate recommendations to make a modification to a control. may identify a portion of problematic computer code that implements the faulty control through the use of machine learning. A computing system may use machine learning to generate embeddings that map incident data and control data (e.g., computer-readable code of a control) to the same vector space. Further, a computing system may use a weighting mechanism that may be used to weight each sample used to train a machine learning model, which may allow a model to train more efficiently.
-
公开(公告)号:US20240169329A1
公开(公告)日:2024-05-23
申请号:US18058172
申请日:2022-11-22
发明人: Jennifer KWOK , Tania Cruz MORALES , Sara Rose BRODSKY , Abhay DONTHI , Joshua EDWARDS , Jason ZWIERZYNSKI
IPC分类号: G06Q20/10
CPC分类号: G06Q20/102
摘要: A method for machine-learning based action generation, and more specifically, using machine-learning to dynamically adjust financial account payments and fees. The method may comprise: receiving user data; determining whether a trigger condition has been met; upon determining that a trigger condition has been met, generating, using a trained machine-learning model, one or more actions based on the user data associated with the user, wherein the trained machine-learning model has been trained based on (i) training user data and (ii) training action data, to learn relationships between the training user data and the training actions data, such that the trained machine-learning model is configured to use the learned relationships to generate one or more actions in response to input of the user data associated with the user; selecting a first action of the one or more actions; and automatically executing the first action.
-
公开(公告)号:US20230388403A1
公开(公告)日:2023-11-30
申请号:US18366658
申请日:2023-08-07
发明人: Sara BRODSKY , Jennifer KWOK , Tania CRUZ MORALES , Joshua EDWARDS , Abhay DONTHI , Jason ZWIERZYNSKI
IPC分类号: H04M1/724 , G06N20/00 , G06F18/214
CPC分类号: H04M1/724 , G06N20/00 , G06F18/214
摘要: Methods and systems are disclosed herein for using one or more machine learning models to determine whether a user is expected to complete a task or action by a deadline. The one or more machine learning models may be trained and/or used to recommend a communication protocol for sending a reminder to the user such that the user is predicted to be more likely to complete an action by the action's deadline. A computing system may use the one or more machine learning models to generate a recommendation for type of reminder to send, for example, if it is predicted that the user is not expected to complete the task by the deadline. A computing system may determine the message to send, the communication protocol to use, and/or the time to send the message.
-
公开(公告)号:US20220368789A1
公开(公告)日:2022-11-17
申请号:US17321571
申请日:2021-05-17
发明人: Sara BRODSKY , Jennifer KWOK , Tania CRUZ MORALES , Joshua EDWARDS , Abhay DONTHI , Jason ZWIERZYNSKI
摘要: Methods and systems are disclosed herein for using one or more machine learning models to determine whether a user is expected to complete a task or action by a deadline. The one or more machine learning models may be trained and/or used to recommend a communication protocol for sending a reminder to the user such that the user is predicted to be more likely to complete an action by the action's deadline. A computing system may use the one or more machine learning models to generate a recommendation for type of reminder to send, for example, if it is predicted that the user is not expected to complete the task by the deadline. A computing system may determine the message to send, the communication protocol to use, and/or the time to send the message.
-
-
-
-
-
-
-
-
-