-
公开(公告)号:US11755981B2
公开(公告)日:2023-09-12
申请号:US17321567
申请日:2021-05-17
发明人: Jeb R. Linton , David K. Wright , Michael Amisano , John Melchionne , John Behnken , Dennis Kramer
IPC分类号: G06Q10/0639 , G07C13/00 , H04N21/475
CPC分类号: G06Q10/06398 , G07C13/00 , H04N21/4758 , H04N21/4756
摘要: Technology for voting, or endorsing with votes, a set of subjects under review, such as a group of human individual peers or a set of products. Each voter in this system is provided with an amount of voting credits that may be allocated among and between at least some of the subjects under review. In some embodiments a discounting scheme is applied to the voting credit allocations so that multiple credits allocated to a single subject will typically count for fewer net “votes” for the subject as the number of credits allocated to that single subject increases. In some embodiments, the discounting scheme is polynomial voting.
-
公开(公告)号:US11665180B2
公开(公告)日:2023-05-30
申请号:US16804898
申请日:2020-02-28
发明人: Jeb R. Linton , Darrel Haswell , Satya Sreenivas , Naeem Altaf , Sanjay Nadhavajhala , Ron Williams , Bradley Evan Harris , John Walter Morris
CPC分类号: H04L63/1416 , G06F18/2155 , G06N3/088 , H04L63/1425
摘要: Methods and systems for artificially intelligent security incident and event management using an attention-based deep neural network and transfer learning are disclosed. A method includes: collecting, by a computing device, system and network activity events in bulk; forming, by the computing device, a corpus using the collected system and network activity events; correlating, by the computing device, discrete events of the system and network activity events into offenses; adding, by the computing device, additional features to the corpus representing the offenses and disposition decisions regarding the offenses; training, by the computing device, a deep neural network using the corpus; and tuning, by the computing device, the deep neural network for a monitored computing environment using transfer learning.
-
公开(公告)号:US11611538B2
公开(公告)日:2023-03-21
申请号:US17521636
申请日:2021-11-08
发明人: Jeb R. Linton , John Behnken , John Melchionne , Dennis Kramer , Michael Amisano , Michael T. Fiori
摘要: A method, apparatus and computer program product to detect whether specific sensitive data of a client is present in a cloud computing infrastructure is implemented without requiring that data be shared with the cloud provider, or that the cloud provider provide the client access to all data in the cloud. Instead of requiring the client to share its database of sensitive information, preferably the client executes a tool that uses a cryptographic protocol, namely, Private Set Intersection (PSI), to enable the client to detect whether their sensitive information is present on the cloud. Any such information identified by the tool is then used to label a document or utterance, send an alert, and/or redact or tokenize the sensitive data.
-
公开(公告)号:US11575665B2
公开(公告)日:2023-02-07
申请号:US17113280
申请日:2020-12-07
摘要: Aspects described herein include a computer-implemented method (and related system and computer program product) comprising receiving, from a bonding service, an authorization request for a predefined authorized use of a good or service by a user. The authorization request indicates that the user meets one or more predefined criteria for the predefined authorized use. The method further comprises determining one or more penalty conditions of a bonding agreement for the predefined authorized use by the user, and receiving, from the bonding service, a confirmation that the user agrees to meet the one or more penalty conditions of the bonding agreement. The method further comprises receiving, from an owner of the good or service, an authorization of the authorization request, and transmitting, responsive to authorization of the authorization request, a token to the bonding service that enables the user to access the predefined authorized use of the good or service.
-
公开(公告)号:US11178117B2
公开(公告)日:2021-11-16
申请号:US16223191
申请日:2018-12-18
发明人: Jeb R. Linton , John Behnken , John Melchionne , Dennis Kramer , Michael Amisano , Michael T. Fiori
摘要: A method, apparatus and computer program product to detect whether specific sensitive data of a client is present in a cloud computing infrastructure is implemented without requiring that data be shared with the cloud provider, or that the cloud provider provide the client access to all data in the cloud. Instead of requiring the client to share its database of sensitive information, preferably the client executes a tool that uses a cryptographic protocol, namely, Private Set Intersection (PSI), to enable the client to detect whether their sensitive information is present on the cloud. Any such information identified by the tool is then used to label a document or utterance, send an alert, and/or redact or tokenize the sensitive data.
-
公开(公告)号:US20210312683A1
公开(公告)日:2021-10-07
申请号:US16837573
申请日:2020-04-01
IPC分类号: G06T13/40 , G06T3/40 , G06T17/20 , G10L13/027 , G06N3/08
摘要: A computer-implemented method for the automatic generation of photorealistic 3D avatars. The method includes generating, using machine learning network, a plurality of 2D photorealistic facial images; generating, using a model agnostic meta-learner, a plurality of 2D photorealistic facial expression images based on the plurality of 2D photorealistic facial images; and generating a plurality of 3D photorealistic avatars based on the plurality of 2D photorealistic facial expression images.
-
公开(公告)号:US20210257088A1
公开(公告)日:2021-08-19
申请号:US16792708
申请日:2020-02-17
发明人: John Melchionne , Michael Amisano , John Behnken , Jeb R. Linton , David K. Wright , Dennis Kramer
摘要: A first patient intervention is identified. The first patient intervention regards a first patient record that includes one or more attributes related to a first patient. The first patient intervention is transmitted to a first program split of a secure multi-party computation. A conflict is detected in the first patient intervention and an existing medical situation regarding the first patient. The conflict is detected by the first program split of the secure multi-party computation and by a third program split of the secure multi-party computation. Based on the detected conflict, a notification is generated by the first program split. The notification is based on the detected conflict. The notification based on the detected conflict is provided to a first client.
-
公开(公告)号:US11074486B2
公开(公告)日:2021-07-27
申请号:US15822995
申请日:2017-11-27
发明人: Jeb R. Linton , David K. Wright
IPC分类号: G06F16/00 , G06K9/68 , G06N3/02 , G06F16/35 , G06F16/2457 , G06F16/332
摘要: The present invention provides a method, computer program product, and system of generating predicted reactions of a user. In some embodiments, the method, computer program product, and system include receiving an intelligence data store, receiving a current data object with a current query and at least one knowledge graph, identifying one or more patterns in the at least one knowledge graph, comparing using a deep neural net, the previous queries and associated one or more patterns with the current query and identified one or more patterns of the current data object, classifying the plurality data objects from the intelligence data store based on a closeness of the current query and identified one or more patterns with each of the previous queries and associated one or more patterns in the intelligence data store, and identifying, by the classification engine, potential dispositions based on the classification of the plurality of data objects.
-
公开(公告)号:US10915642B2
公开(公告)日:2021-02-09
申请号:US16202355
申请日:2018-11-28
发明人: Jeb R. Linton , Dennis Kramer , Irma Sheriff
摘要: A method, system, and computer program product for performing strong desensitization of sensitive data within a garbled circuit includes: compiling a predetermined program into a first program, where the compiled first program is encoded in a form of a garbled circuit, and where the predetermined program runs on sensitive data; and executing the first program, where executing the first program includes: executing an analytics function using tokenized data with a first set of sensitive information and analytics data with a second set of sensitive information, where the tokenized data originated from a data provider and the analytics data originated from an analytics provider; and generating an output of the first program using a result of the analytics function, where the output contains desensitized data.
-
公开(公告)号:US10708234B2
公开(公告)日:2020-07-07
申请号:US15079203
申请日:2016-03-24
摘要: A third party intermediary and a data protection method, system, and non-transitory computer readable medium, include a content request receiving circuit configured to receive a service request from a user, to communicate the service request to a provider, and to receive pre-approved versions of content from the provider, a content matching circuit configured to match a pre-approved version of content of the pre-approved versions of content to the user based on a condition of the user, a user data receiving circuit configured to receive user data to complete the pre-approved version of the content, and a zero-knowledge verifiable computing circuit configured to execute a program using zero-knowledge verifiable computing to remove private content from the pre-approved version of the content to ensure privacy of the condition of the user from the provider.
-
-
-
-
-
-
-
-
-