PEER-BASED SELECTION USING MACHINE LEARNING
    5.
    发明公开

    公开(公告)号:US20230316372A1

    公开(公告)日:2023-10-05

    申请号:US17657250

    申请日:2022-03-30

    IPC分类号: G06Q30/06 G06N20/00 G06Q10/02

    摘要: In some implementations, a system may generate a first exchange profile for a first user and a second exchange profile for a second user. The first exchange profile may identify one or more characteristics of an exchange behavior of the first user based on exchange data of the first user, and the second exchange profile may identify one or more characteristics of an exchange behavior of the second user based on exchange data of the second user. The system may receive, from a first device of the first user, a request for a selection for the first user. The system may determine, based on the first exchange profile and the second exchange profile, an entity that is relevant to the first user. The system may transmit, to the first device of the first user, information indicating the selection for the first user, where the selection identifies the entity.

    USER AUTHENTICATION
    8.
    发明公开
    USER AUTHENTICATION 审中-公开

    公开(公告)号:US20240349048A1

    公开(公告)日:2024-10-17

    申请号:US18663844

    申请日:2024-05-14

    IPC分类号: H04W12/06 H04L9/30 H04W12/63

    CPC分类号: H04W12/06 H04L9/30 H04W12/63

    摘要: Methods and systems are disclosed herein for secure communication between computing devices. A mobile device may communicate with an untrusted device to cause the untrusted device to send information (e.g., encrypted information that the untrusted device is unable to decrypt) to a server using an Internet connection of the untrusted device. The mobile device may have limited or no access to the Internet. To prevent potential security risks associated with using a public or untrusted device, the mobile device may encrypt information stored on the mobile device (e.g., stored in a mobile application associated with the server), send it to the untrusted device (e.g., by displaying a QR code to a camera of the untrusted device), and the untrusted device may send the information to the server via a network connection of the untrusted device.