Latest Patents

Patents imply intellectual property and it has a $ value that can be associated depending on the field and type of patent that is allocated. Patents also increase the enterprise value of the company and help prevent copy-cats from copying the idea without having royalt payments or licencing deals. We like it when companies get patents awarded!. To protect IP companies aggressively file provisional patents even before they have a working product. The below table provides a way to look at what has been done by companies and use this as a factor to make investment decisions.

     
Title Filing Date Publication Date Grant Date
Model integration tool 2023-6-14 2023-7-06
Detecting synthetic online entities facilitated by primary entities 2023-5-22 2023-6-15
Data access control system accessible from third-party web 2023-4-21 2023-8-17
Universal Digital Identity Authentication Service 2023-4-10 2023-8-10
Graph-based techniques for detecting synthetic online identities 2023-4-07 2023-8-03
Confirming authenticity of a user to a third-party system 2023-3-30 2023-7-27
Production-ready attributes creation and management for software development 2023-3-14 2023-7-06
Techniques for evaluating an effect of changes to machine learning models 2022-12-29 2023-7-06
Machine-learning techniques for risk assessment based on multiple data sources 2022-12-23 2023-6-29
Unified explainable machine learning for segmented risk 2022-12-22 2023-7-06
Machine learning model predictions via augmenting time series observations 2022-12-21 2023-6-22
Consolidation of data sources for expedited validation of risk assessment data 2022-12-16 2023-6-22
Explainable machine learning based on wavelet analysis 2022-12-16 2023-6-22
Automated decision techniques for controlling resource access 2022-11-18 2023-3-16
Machine-learning techniques for risk assessment based on clustering 2022-11-18 2023-5-25
Bayesian modeling for risk assessment based on integrating information from … 2022-11-11 2023-5-19
Interactive model performance monitoring 2022-11-07 2023-5-11
Evaluation of modeling algorithms with continuous outputs 2022-11-04 2023-3-30
Data validation techniques for sensitive data migration across multiple … 2022-10-21 2023-6-15
Controlling access to secured data via timed filtering of data 2022-10-20 2023-2-23
Bias detection and reduction in machine-learning techniques 2022-10-17 2023-5-04
Data compression techniques for machine learning models 2022-10-06 2023-4-13
Data protection via aggregation-based obfuscation 2022-9-21 2023-1-19
Clustering techniques for machine learning models 2022-9-20 2023-1-12
Continuous and anonymous risk evaluation 2022-9-09 2023-1-05
Machine-learning techniques for monotonic neural networks 2022-8-31 2022-12-29
Managing verification repositories to facilitate real-time servicing of … 2022-8-31 2022-9-22
Dual deep learning architecture for machine-learning systems 2022-8-17 2022-12-08
Configuration of user interface for risk assessment visualization 2022-8-01 2023-2-09
Machine learning models with efficient feature learning 2022-7-28 2023-2-16
Machine-Learning Techniques For Monotonic Neural Networks 2022-6-30 2022-7-21
Optimizing automated modeling algorithms for risk assessment and generation of … 2022-6-28 2022-7-21
Verification of electronic identity components 2022-6-23 2022-7-14
Continuous risk assessment of individual elements of a system 2022-5-25 2022-12-15
Updating attribute data structures to indicate joint relationships among … 2022-5-06 2022-5-26
Secure online access control to prevent identification information misuse 2022-4-14 2022-7-28
Verifying an identity based on multiple distributed data sources using a … 2022-2-17 2022-6-02
Machine-learning techniques for time-delay neural networks 2021-12-22 2022-6-30
Explainable machine learning based on time-series transformation 2021-12-08 2023-6-15
Constructing executable program code based on sequence codes 2021-11-22 2022-5-27
Explainable machine-learning modeling using wavelet predictor variable data 2021-11-11 2022-5-19
Machine-learning techniques involving monotonic recurrent neural networks 2021-11-09 2022-5-19
Controlling access to secured data in multi-system exchange environments 2021-11-01 2022-2-17
Records matching techniques for facilitating database search and fragmented … 2021-10-13 2023-4-20
Fragmented record detection based on records matching techniques 2021-10-13 2023-4-20
Records matching techniques for facilitating database search and fragmented … 2021-10-13 2023-4-20
Power graph convolutional network for explainable machine learning 2021-10-07 2023-4-13
Predicting data tampering using augmented machine learning models 2021-9-27 2022-4-07
Updating Attribute Data Structures to Indicate Trends in Attribute Data … 2021-9-17 2023-6-29 2023-6-29
Building and managing data-processing attributes for modelled data sources 2021-8-06 2021-8-26
Machine-learning techniques for factor-level monotonic neural networks 2021-7-14 2022-1-27
Building segment-specific executable program code for modeling outputs 2021-6-07 2021-9-23
Automated Model Development Process 2021-5-24 2021-6-24
Techniques for prediction models using time series data 2021-3-31 2022-10-06
Detecting synthetic online entities 2021-3-04 2021-7-08
Optimizing neural networks for generating analytical or predictive outputs 2021-3-02 2021-6-17
Machine-learning techniques to generate recommendations for risk mitigation 2021-2-22 2021-9-02
Training tree-based machine-learning modeling algorithms for predicting outputs … 2021-2-22 2021-6-10
Creating predictor variables for prediction models from unstructured data using … 2020-12-28 2021-7-08
Third-party access-control support using role history analysis 2020-9-30 2022-8-10
Secure resource management to prevent resource abuse 2020-9-03 2022-10-13
Synchronizing data-entry fields with corresponding image regions 2020-8-28 2021-9-07 2021-9-07
Automated path-based recommendation for risk mitigation 2020-8-19 2021-2-25
Secure resource management to prevent fraudulent resource access 2020-7-09 2022-8-18
Facilitating entity resolution via secure entity resolution database 2020-5-20 2020-9-03
Data protection via attributes-based aggregation 2020-5-13 2020-11-19
Providing identification information to mobile commerce applications 2020-5-01 2020-5-21
Transforming attributes for training automated modeling systems 2020-4-15 2020-5-07
Integrating sensitive data from a data provider into instances of third-party … 2020-1-23 2020-5-21
Controlling access to multi-granularity data 2019-9-24 2020-4-09
Systems and methods for securing data in electronic communications 2019-8-22 2019-12-12
Training or using sets of explainable machine-learning modeling algorithms for … 2019-5-10 2020-11-26
Facilitating queries of encrypted sensitive data via encrypted variant data … 2019-3-22 2019-9-26
Verification of access to secured electronic resources 2019-1-31 2019-8-08
Facilitating entity resolution, keying, and search match without transmitting … 2019-1-08 2019-7-11
Embedded third-party application programming interface to prevent transmission … 2018-12-13 2019-6-20
Synthetic online entity detection 2018-11-26 2023-4-11 2023-4-11
Providing Identification Information During an Interaction With an Interactive … 2018-10-15 2019-2-14
Third-party authorization support for interactive computing environment … 2018-6-28 2020-12-08 2020-12-08
Machine-learning system for servicing queries for digital content 2018-6-18 2023-9-05 2023-9-05
Machine-learning system for servicing queries for digital content 2018-6-18 2021-2-11
Location-based detection of unauthorized use of interactive computing … 2018-4-13 2022-7-13 2022-7-13
Text classification using automatically generated seed data 2018-3-22 2019-9-26
Software development platform for testing and modifying decision algorithms 2018-2-22 2021-9-28 2021-9-28
Confirming authenticity of a user to a third-party system 2018-1-05 2022-12-23
Generating and processing obfuscated sensitive information 2017-11-28 2020-3-05
Data processing systems and methods for efficiently transforming entity … 2017-11-06 2022-8-16 2022-8-16
Global matching system 2017-4-26 2019-5-09
Networked transmission of reciprocal identity related data messages 2016-10-19 2017-2-09
Providing compressed risk assessment messages for real-time transmission via … 2016-9-26 2019-1-08 2019-1-08
Modifying data structures to indicate derived relationships among entity data … 2016-7-06 2017-1-12
Increasing reliability of information available to parties in market … 2014-5-07 2014-11-13
Systems and methods for network risk reduction 2013-12-20 2015-11-04
Systems and methods for intelligent parallel searching 2013-10-25 2014-5-01
Determining a personalized fusion score 2012-12-28 2013-7-04
Verification and authentication systems and methods 2012-6-29 2014-7-29 2014-7-29
Systems and methods for using verified information cards in a communications … 2010-3-03 2018-9-04 2018-9-04
Macroeconomic-Adjusted Credit Risk Score Systems and Methods 2010-1-19 2010-6-10
Systems and methods for detecting child identity theft 2008-11-13 2012-7-17 2012-7-17
Methods and systems for providing risk ratings for use in person-to-person … 2008-10-31 2009-5-07