| Model integration tool |
2023-6-14 |
2023-7-06 |
|
| Detecting synthetic online entities facilitated by primary entities |
2023-5-22 |
2023-6-15 |
|
| Data access control system accessible from third-party web |
2023-4-21 |
2023-8-17 |
|
| Universal Digital Identity Authentication Service |
2023-4-10 |
2023-8-10 |
|
| Graph-based techniques for detecting synthetic online identities |
2023-4-07 |
2023-8-03 |
|
| Confirming authenticity of a user to a third-party system |
2023-3-30 |
2023-7-27 |
|
| Production-ready attributes creation and management for software development |
2023-3-14 |
2023-7-06 |
|
| Techniques for evaluating an effect of changes to machine learning models |
2022-12-29 |
2023-7-06 |
|
| Machine-learning techniques for risk assessment based on multiple data sources |
2022-12-23 |
2023-6-29 |
|
| Unified explainable machine learning for segmented risk |
2022-12-22 |
2023-7-06 |
|
| Machine learning model predictions via augmenting time series observations |
2022-12-21 |
2023-6-22 |
|
| Consolidation of data sources for expedited validation of risk assessment data |
2022-12-16 |
2023-6-22 |
|
| Explainable machine learning based on wavelet analysis |
2022-12-16 |
2023-6-22 |
|
| Automated decision techniques for controlling resource access |
2022-11-18 |
2023-3-16 |
|
| Machine-learning techniques for risk assessment based on clustering |
2022-11-18 |
2023-5-25 |
|
| Bayesian modeling for risk assessment based on integrating information from … |
2022-11-11 |
2023-5-19 |
|
| Interactive model performance monitoring |
2022-11-07 |
2023-5-11 |
|
| Evaluation of modeling algorithms with continuous outputs |
2022-11-04 |
2023-3-30 |
|
| Data validation techniques for sensitive data migration across multiple … |
2022-10-21 |
2023-6-15 |
|
| Controlling access to secured data via timed filtering of data |
2022-10-20 |
2023-2-23 |
|
| Bias detection and reduction in machine-learning techniques |
2022-10-17 |
2023-5-04 |
|
| Data compression techniques for machine learning models |
2022-10-06 |
2023-4-13 |
|
| Data protection via aggregation-based obfuscation |
2022-9-21 |
2023-1-19 |
|
| Clustering techniques for machine learning models |
2022-9-20 |
2023-1-12 |
|
| Continuous and anonymous risk evaluation |
2022-9-09 |
2023-1-05 |
|
| Machine-learning techniques for monotonic neural networks |
2022-8-31 |
2022-12-29 |
|
| Managing verification repositories to facilitate real-time servicing of … |
2022-8-31 |
2022-9-22 |
|
| Dual deep learning architecture for machine-learning systems |
2022-8-17 |
2022-12-08 |
|
| Configuration of user interface for risk assessment visualization |
2022-8-01 |
2023-2-09 |
|
| Machine learning models with efficient feature learning |
2022-7-28 |
2023-2-16 |
|
| Machine-Learning Techniques For Monotonic Neural Networks |
2022-6-30 |
2022-7-21 |
|
| Optimizing automated modeling algorithms for risk assessment and generation of … |
2022-6-28 |
2022-7-21 |
|
| Verification of electronic identity components |
2022-6-23 |
2022-7-14 |
|
| Continuous risk assessment of individual elements of a system |
2022-5-25 |
2022-12-15 |
|
| Updating attribute data structures to indicate joint relationships among … |
2022-5-06 |
2022-5-26 |
|
| Secure online access control to prevent identification information misuse |
2022-4-14 |
2022-7-28 |
|
| Verifying an identity based on multiple distributed data sources using a … |
2022-2-17 |
2022-6-02 |
|
| Machine-learning techniques for time-delay neural networks |
2021-12-22 |
2022-6-30 |
|
| Explainable machine learning based on time-series transformation |
2021-12-08 |
2023-6-15 |
|
| Constructing executable program code based on sequence codes |
2021-11-22 |
2022-5-27 |
|
| Explainable machine-learning modeling using wavelet predictor variable data |
2021-11-11 |
2022-5-19 |
|
| Machine-learning techniques involving monotonic recurrent neural networks |
2021-11-09 |
2022-5-19 |
|
| Controlling access to secured data in multi-system exchange environments |
2021-11-01 |
2022-2-17 |
|
| Records matching techniques for facilitating database search and fragmented … |
2021-10-13 |
2023-4-20 |
|
| Fragmented record detection based on records matching techniques |
2021-10-13 |
2023-4-20 |
|
| Records matching techniques for facilitating database search and fragmented … |
2021-10-13 |
2023-4-20 |
|
| Power graph convolutional network for explainable machine learning |
2021-10-07 |
2023-4-13 |
|
| Predicting data tampering using augmented machine learning models |
2021-9-27 |
2022-4-07 |
|
| Updating Attribute Data Structures to Indicate Trends in Attribute Data … |
2021-9-17 |
2023-6-29 |
2023-6-29 |
| Building and managing data-processing attributes for modelled data sources |
2021-8-06 |
2021-8-26 |
|
| Machine-learning techniques for factor-level monotonic neural networks |
2021-7-14 |
2022-1-27 |
|
| Building segment-specific executable program code for modeling outputs |
2021-6-07 |
2021-9-23 |
|
| Automated Model Development Process |
2021-5-24 |
2021-6-24 |
|
| Techniques for prediction models using time series data |
2021-3-31 |
2022-10-06 |
|
| Detecting synthetic online entities |
2021-3-04 |
2021-7-08 |
|
| Optimizing neural networks for generating analytical or predictive outputs |
2021-3-02 |
2021-6-17 |
|
| Machine-learning techniques to generate recommendations for risk mitigation |
2021-2-22 |
2021-9-02 |
|
| Training tree-based machine-learning modeling algorithms for predicting outputs … |
2021-2-22 |
2021-6-10 |
|
| Creating predictor variables for prediction models from unstructured data using … |
2020-12-28 |
2021-7-08 |
|
| Third-party access-control support using role history analysis |
2020-9-30 |
2022-8-10 |
|
| Secure resource management to prevent resource abuse |
2020-9-03 |
2022-10-13 |
|
| Synchronizing data-entry fields with corresponding image regions |
2020-8-28 |
2021-9-07 |
2021-9-07 |
| Automated path-based recommendation for risk mitigation |
2020-8-19 |
2021-2-25 |
|
| Secure resource management to prevent fraudulent resource access |
2020-7-09 |
2022-8-18 |
|
| Facilitating entity resolution via secure entity resolution database |
2020-5-20 |
2020-9-03 |
|
| Data protection via attributes-based aggregation |
2020-5-13 |
2020-11-19 |
|
| Providing identification information to mobile commerce applications |
2020-5-01 |
2020-5-21 |
|
| Transforming attributes for training automated modeling systems |
2020-4-15 |
2020-5-07 |
|
| Integrating sensitive data from a data provider into instances of third-party … |
2020-1-23 |
2020-5-21 |
|
| Controlling access to multi-granularity data |
2019-9-24 |
2020-4-09 |
|
| Systems and methods for securing data in electronic communications |
2019-8-22 |
2019-12-12 |
|
| Training or using sets of explainable machine-learning modeling algorithms for … |
2019-5-10 |
2020-11-26 |
|
| Facilitating queries of encrypted sensitive data via encrypted variant data … |
2019-3-22 |
2019-9-26 |
|
| Verification of access to secured electronic resources |
2019-1-31 |
2019-8-08 |
|
| Facilitating entity resolution, keying, and search match without transmitting … |
2019-1-08 |
2019-7-11 |
|
| Embedded third-party application programming interface to prevent transmission … |
2018-12-13 |
2019-6-20 |
|
| Synthetic online entity detection |
2018-11-26 |
2023-4-11 |
2023-4-11 |
| Providing Identification Information During an Interaction With an Interactive … |
2018-10-15 |
2019-2-14 |
|
| Third-party authorization support for interactive computing environment … |
2018-6-28 |
2020-12-08 |
2020-12-08 |
| Machine-learning system for servicing queries for digital content |
2018-6-18 |
2023-9-05 |
2023-9-05 |
| Machine-learning system for servicing queries for digital content |
2018-6-18 |
2021-2-11 |
|
| Location-based detection of unauthorized use of interactive computing … |
2018-4-13 |
2022-7-13 |
2022-7-13 |
| Text classification using automatically generated seed data |
2018-3-22 |
2019-9-26 |
|
| Software development platform for testing and modifying decision algorithms |
2018-2-22 |
2021-9-28 |
2021-9-28 |
| Confirming authenticity of a user to a third-party system |
2018-1-05 |
2022-12-23 |
|
| Generating and processing obfuscated sensitive information |
2017-11-28 |
2020-3-05 |
|
| Data processing systems and methods for efficiently transforming entity … |
2017-11-06 |
2022-8-16 |
2022-8-16 |
| Global matching system |
2017-4-26 |
2019-5-09 |
|
| Networked transmission of reciprocal identity related data messages |
2016-10-19 |
2017-2-09 |
|
| Providing compressed risk assessment messages for real-time transmission via … |
2016-9-26 |
2019-1-08 |
2019-1-08 |
| Modifying data structures to indicate derived relationships among entity data … |
2016-7-06 |
2017-1-12 |
|
| Increasing reliability of information available to parties in market … |
2014-5-07 |
2014-11-13 |
|
| Systems and methods for network risk reduction |
2013-12-20 |
2015-11-04 |
|
| Systems and methods for intelligent parallel searching |
2013-10-25 |
2014-5-01 |
|
| Determining a personalized fusion score |
2012-12-28 |
2013-7-04 |
|
| Verification and authentication systems and methods |
2012-6-29 |
2014-7-29 |
2014-7-29 |
| Systems and methods for using verified information cards in a communications … |
2010-3-03 |
2018-9-04 |
2018-9-04 |
| Macroeconomic-Adjusted Credit Risk Score Systems and Methods |
2010-1-19 |
2010-6-10 |
|
| Systems and methods for detecting child identity theft |
2008-11-13 |
2012-7-17 |
2012-7-17 |
| Methods and systems for providing risk ratings for use in person-to-person … |
2008-10-31 |
2009-5-07 |
|