To improve processing of the multi-event time-series data, information about each event type is aggregated for a group of time bins, such that an event bin embedding represents the occurring events of that type in the time bin. The event bin embedding may be based on an aggregated event value summarizing the values of that event type in the bin and a count of those events. The event bin embeddings across event types and time bins may be combined with an embedding for static data about the data instance and a representation token for input to an encoder. The encoder may apply an event-focused sublayer and a time-focused sublayer that attend to respective dimensions of the encoder. The model may be initially trained with self-supervised learning with time and event masking and then fine-tuned for particular applications.
Computational systems and methods are provided to automatically assess residual characteristics of an existing machine learning model to identify and determine suboptimal pockets and augmentation strategies. A computing system, device and method for optimizing a machine learning model for performing predictions is provided. The computing device performs sub-optimal pocket identification on an existing machine learning algorithm by residual analysis to calculate an error. The computing device utilizes the residual as a target for an ensemble tree model and automatically generates a set of interpretable rules from the tree based ensemble model that contribute to the suboptimal pockets. The rules indicating relationships between features and interactions as well as values for the sub-optimal pockets. The computing device determines optimizations for improving the machine learning model based on the interpretable computer-implemented rules.
One example method includes obtaining, based on network activity related to an object deployed within a networked environment, a number of threat events for the object and a corresponding set of severity scores. An aggregate risk score can be generated for the object based on the number of threat events and the corresponding severity scores. The aggregate risk score can be refined based on at least one weighting parameter to obtain an intermediate score. The intermediate score can be scaled, using a scaling function, to obtain an overall risk score that represents a value within a predefined numerical range. Access of the object to system resources can be controlled based on whether the overall risk score exceeds the predetermined risk threshold value, with access being allowed when the overall risk score exceeds the predetermined threshold and access being restricted when the overall risk score does not exceed the predetermined threshold.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
4.
DYNAMIC MODIFICATION OF DISPLAYED INTERFACE ELEMENTS BASED ON CONTEXTUAL DATA
The disclosed embodiments include computer-implemented systems and processes that dynamically and selectively modify portions of a displayed interface to include interface elements that, when selected by a user through a single provided input, initiate a performance of a data exchange in accordance with parameter values consistent with prior initiated data exchanges. For example, a communications device may display, on a display unit, a first interface element representative of a first data exchange and may receive expected values of parameters that characterize the second data exchange. When a determined parameter value is consistent with the expected parameter values, the communications device may modify the first interface element and present, on the display unit, the modified first interface element and a second interface element within the interface. Upon selection of the second interface element, the communications device may initiate the second data exchange in accordance with the expected parameter values.
One example method includes obtaining, based on network activity related to an object deployed within a networked environment, a number of threat events for the object and a corresponding set of severity scores. An aggregate risk score can be generated for the object based on the number of threat events and the corresponding severity scores. The aggregate risk score can be refined based on at least one weighting parameter to obtain an intermediate score. The intermediate score can be scaled, using a scaling function, to obtain an overall risk score that represents a value within a predefined numerical range. Access of the object to system resources can be controlled based on whether the overall risk score exceeds the predetermined risk threshold value, with access being allowed when the overall risk score exceeds the predetermined threshold and access being restricted when the overall risk score does not exceed the predetermined threshold.
A computer-implemented method is disclosed. The method includes: receiving an authentication request to authenticate a first entity to a service; in response to receiving the authentication request: generating a message for requesting the first entity to initiate a transfer of resources from a first data record; and transmitting the message to a first server that requires user authentication for the first entity to access the message; and generating a response to the authentication request based on a completion status of the requested transfer.
Computing platforms, methods, and storage media for providing multi-channel authentication are disclosed. Exemplary implementations may: receive, from a plurality of system access channels, authentication data related to a plurality of data transfers and to a plurality of users; consolidate the authentication data from the plurality of access channels to generate a set of consolidated authentication data; and generate a user interface, based on the set of consolidated authentication data, to enable execution of a centrally-provided authentication function at a selected system access channel for a selected user initiating a data transfer. An authentication hub according to an implementation may provide a common authentication experience and improved authentication for the plurality of access channels, which may include a telephone contact center, an in-person or branch location, and online services such as web-based or app-based.
There is provided a computer implemented method, system and device for automatically generating a machine learning model for forecasting a likelihood of compromise in one or more transaction devices and subsequently triggering performing an action on one or more related computing devices based on a potentially compromised transaction device.
There is provided a computer implemented method, system and device for automatically generating a machine learning model for forecasting a likelihood of compromise in one or more transaction devices and subsequently triggering performing an action on one or more related computing devices based on a potentially compromised transaction device.
G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
G06F 18/213 - Extraction de caractéristiques, p.ex. en transformant l'espace des caractéristiques; Synthétisations; Mappages, p.ex. procédés de sous-espace
G06F 18/214 - Génération de motifs d'entraînement; Procédés de Bootstrapping, p.ex. ”bagging” ou ”boosting”
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
10.
SYSTEM AND METHOD FOR PROVIDING MULTI-CHANNEL AUTHENTICATION
Computing platforms, methods, and storage media for providing multi-channel authentication are disclosed. Exemplary implementations may: receive, from a plurality of system access channels, authentication data related to a plurality of data transfers and to a plurality of users; consolidate the authentication data from the plurality of access channels to generate a set of consolidated authentication data; and generate a user interface, based on the set of consolidated authentication data, to enable execution of a centrally-provided authentication function at a selected system access channel for a selected user initiating a data transfer. An authentication hub according to an implementation may provide a common authentication experience and improved authentication for the plurality of access channels, which may include a telephone contact center, an in-person or branch location, and online services such as web-based or app-based.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
11.
System and Method For Handling Real-Time Transactional Events
A system, method, and memory for handling real-time transactional events is disclosed. The exemplary system a processor to detect and add an event to a queue and identify an associated event type. Event types can require downstream processing by at least one provider. The processor decomposes the event into tasks by comparison to event types which associate downstream provider requirements to tasks and routes. One or more routes are assigned to the tasks, each route defined by at least one processor of a plurality of processors. One or more routes are defined by transmitting a request for downstream processing to the at least one provider. The processor, upon detecting incomplete performance of the one or more routes, either updates the tasks associated with the incomplete route, or marks the event associated with the route as incomplete in the queue.
G06F 9/48 - Lancement de programmes; Commutation de programmes, p.ex. par interruption
G06F 11/07 - Réaction à l'apparition d'un défaut, p.ex. tolérance de certains défauts
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
To improve processing of the multi-event time-series data, information about each event type is aggregated for a group of time bins, such that an event bin embedding represents the occurring events of that type in the time bin. The event bin embedding may be based on an aggregated event value summarizing the values of that event type in the bin and a count of those events. The event bin embeddings across event types and time bins may be combined with an embedding for static data about the data instance and a representation token for input to an encoder. The encoder may apply an event-focused sublayer and a time-focused sublayer that attend to respective dimensions of the encoder. The model may be initially trained with self- supervised learning with time and event masking and then fine-tuned for particular applications.
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
G16H 10/00 - TIC spécialement adaptées au maniement ou au traitement des données médicales ou de soins de santé relatives aux patients
G06Q 40/00 - Finance; Assurance; Stratégies fiscales; Traitement des impôts sur les sociétés ou sur le revenu
A computer-implemented method is disclosed. The method includes: receiving a first request to initiate a first customer service session; establishing a primary web socket connection between a first web server and service agent terminal; establishing a first communication sub-channel associated with the primary web socket connection, the first communication sub- channel corresponding to the first customer service session; receiving a second request to initiate a second customer service session; in response to receiving the second request: establishing a second communication sub-channel associated with the primary web socket connection, the second communication sub-channel corresponding to the second customer service session.
Computational systems and methods are provided to automatically assess residual characteristics of an existing machine learning model to identify and determine suboptimal pockets and augmentation strategies. A computing system, device and method for optimizing a machine learning model for performing predictions is provided. The computing device performs sub-optimal pocket identification on an existing machine learning algorithm by residual analysis to calculate an error. The computing device utilizes the residual as a target for an ensemble tree model and automatically generates a set of interpretable rules from the tree based ensemble model that contribute to the suboptimal pockets. The rules indicating relationships between features and interactions as well as values for the sub-optimal pockets. The computing device determines optimizations for improving the machine learning model based on the interpretable computer-implemented rules.
A server computer system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to analyze historical data transfers within one or more resource accounts to generate a data budget; receive a signal indicating a data transfer request; analyze the data transfer request and, based on the data budget, determine an affordability of the data transfer; responsive to determining that the data transfer is not affordable from one of the resource accounts, generate one or more recommendations to afford the data transfer; and send, via the communications module and to a computing device, a signal causing the computing device to display a notification that includes the one or more recommendations to afford the data transfer.
G06Q 20/02 - Architectures, schémas ou protocoles de paiement impliquant un tiers neutre, p.ex. une autorité de certification, un notaire ou un tiers de confiance
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
16.
System And Method for Implementing Micro-Application Environments
A system, method, and computer readable medium for implementing micro-application environments is disclosed. The exemplary method includes providing a browser container (“browser”), and providing at least one micro-application for operating within the browser. The method includes providing a plug-in for the browser. The plug-in configured to listen to events originating in, or push events to, the at least one micro-application. The method includes storing, via the plug-in, documentation of events that each of the at least one micro-application subscribes to. The method includes determining, via the plug-in, occurrence of a first event, the first event being subscribed to by the at least one micro-application, and in response to determining the occurrence, generating, via the plug-in, a message to the at least one micro-application based on the event. The method includes executing, via the at least one micro-application, a new action in response to receiving the message.
Methods and computer systems for managing access to resources in a computing environment. Detecting a projected overload condition from a projected demand for a resource. Identifying a server associated with a resource demand scheduled to be fulfilled prior to the projected overload condition. Generating a rescheduling request to reschedule the resource demand until after the projected overload condition. Sending the rescheduling request to the identified server. Providing access to the resource at a rescheduled time.
A method may include: detecting a predicted resource availability condition associated with a first account by determining that an accumulated resource amount associated with a resource transfer expected to be scheduled to occur at a future time is expected to be available; in response to detecting the predicted resource availability condition, providing a selectable interface feature on a computing device, the selectable interface feature configured for inputting an early access instruction to request immediate release of at least a portion of the accumulated resource amount; receiving the early access instruction; and in response to receiving the early access instruction, sending a request-to-transfer message to a second account, the second account identified as being associated with the resource transfer expected to be scheduled to occur, the request-to-transfer message requesting a transfer of an amount of resources that is less than or equal to the accumulated resource amount.
Computing platforms, methods, and storage media for providing third party access to a co-branded product in a system are disclosed. In an example, a system may receive, at a system of a first entity, registration information of a user registered with a second entity. The system may comprise a record associating the user with a co-branded product jointly provided by the first entity and the second entity. The system may validate, using at least one hardware processor, the registration information at the system based on the record. The system may initiate, using the at least one processor, in response to a successful validation of the registration information, a new user session having a co-branded product session identifier where the new user session provides access to the user to the co-branded product in the system.
A computer-implemented method is disclosed. The method includes: detecting a trigger condition associated with a data record based on monitoring data record operations in connection with the data record; in response to detecting the trigger condition, generating a first message object for the data record, the first message object being associated with at least one compatible access channel; storing the first message object in a memory, the first message object being stored in association with a set of one or more message objects for the data record, wherein the first set defines an order for the one or more message objects; detecting a data record operation via a first access channel; retrieving, from the memory, at least one message object of the set that is associated with the first access channel; and causing the at least one message object to be delivered via the first access channel.
Computing platforms, methods, and storage media for performing an information technology security risk assessment are disclosed. Exemplary implementations may: provide a tool assessment interface for receiving model data associated with a software tool; obtain the model data for the software tool; perform a software tool risk assessment based on the model data and independent from the tool-specific functionality data; generate a model-based risk determination based on the software tool risk assessment; and output the model-based risk determination via the tool assessment interface. Exemplary implementations may use model data to perform a software tool risk assessment, rather than a model assessment, without requiring disclosure of confidential functionality details associated with the software tool, such as relating to artificial intelligence or machine learning. Exemplary implementations may pre-populate a first set of data in the interface and prompt a vendor to obtain a vendor-provided second set of model data via the interface.
A method may include: detecting a predicted resource availability condition associated with a first account by determining that an accumulated resource amount associated with a resource transfer expected to be scheduled to occur at a future time is expected to be available; in response to detecting the predicted resource availability condition, providing a selectable interface feature on a computing device, the selectable interface feature configured for inputting an early access instruction to request immediate release of at least a portion of the accumulated resource amount; receiving the early access instruction; and in response to receiving the early access instruction, sending a request-to-transfer message to a second account, the second account identified as being associated with the resource transfer expected to be scheduled to occur, the request-to-transfer message requesting a transfer of an amount of resources that is less than or equal to the accumulated resource amount.
Computing platforms, methods, and storage media for providing third party access to a co- branded product in a system are disclosed. In an example, a system may receive, at a system of a first entity, registration information of a user registered with a second entity. The system may comprise a record associating the user with a co-branded product jointly provided by the first entity and the second entity. The system may validate, using at least one hardware processor, the registration information at the system based on the record. The system may initiate, using the at least one processor, in response to a successful validation of the registration information, a new user session having a co-branded product session identifier where the new user session provides access to the user to the co-branded product in the system.
Computing platforms, methods, and storage media for performing an information technology security risk assessment are disclosed. Exemplary implementations may: provide a tool assessment interface for receiving model data associated with a software tool; obtain the model data for the software tool; perform a software tool risk assessment based on the model data and independent from the tool-specific functionality data; generate a model-based risk determination based on the software tool risk assessment; and output the model-based risk determination via the tool assessment interface. Exemplary implementations may use model data to perform a software tool risk assessment, rather than a model assessment, without requiring disclosure of confidential functionality details associated with the software tool, such as relating to artificial intelligence or machine learning. Exemplary implementations may pre- populate a first set of data in the interface and prompt a vendor to obtain a vendor- provided second set of model data via the interface.
A system, method, and computer readable medium for implementing micro- application environments is disclosed. The exemplary method includes providing a browser container ("browser"), and providing at least one micro-application for operating within the browser. The method includes providing a plug-in for the browser. The plug- in configured to listen to events originating in, or push events to, the at least one micro- application. The method includes storing, via the plug-in, documentation of events that each of the at least one micro-application subscribes to. The method includes determining, via the plug-in, occurrence of a first event, the first event being subscribed to by the at least one micro-application, and in response to determining the occurrence, generating, via the plug-in, a message to the at least one micro-application based on the event. The method includes executing, via the at least one micro- application, a new action in response to receiving the message.
G06F 9/44 - Dispositions pour exécuter des programmes spécifiques
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
26.
SYSTEMS AND METHODS FOR MANAGING ACCESS TO RESOURCES IN A COMPUTING ENVIRONMENT
Methods and computer systems for managing access to resources in a computing environment. Detecting a projected overload condition from a projected demand for a resource. Identifying a server associated with a resource demand scheduled to be fulfilled prior to the projected overload condition. Generating a rescheduling request to reschedule the resource demand until after the projected overload condition. Sending the rescheduling request to the identified server. Providing access to the resource at a rescheduled time.
H04L 67/62 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises en établissant un calendrier pour servir les requêtes
H04L 47/122 - Prévention de la congestion; Récupération de la congestion en détournant le trafic des entités congestionnées
H04L 51/07 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel caractérisée par l'inclusion de contenus spécifiques
27.
GRAPHICAL USER INTERFACES FOR MANAGING RESOURCE ACCOUNTS
A computer-implemented method is disclosed. The method includes: obtaining historical operations data for a resource account, the historical operations data identifying account operations performed by a user in connection with the resource account; generating display data for a graphical user interface for accessing the resource account, the display data including user interface elements associated with a first set of highest priority account operations that are selected based on the historical operations data for the resource account; obtaining user engagement data representing user interaction with the graphical user interface, the user engagement data identifying at least one account operation; identifying a second set of highest priority account operations based on the user engagement data; generating updated display data for the graphical user interface associated with the second set of highest priority account operations; and providing, to a client device for display thereon, the updated display data.
A computer server system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to obtain an indication of scheduled access to a first node class of a shared resource; determine that a second node class of the shared resource is available; and schedule access to the second node class of the shared resource in place of the scheduled access to the first node class of the shared resource.
G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
H04L 67/62 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises en établissant un calendrier pour servir les requêtes
29.
MULTIDIRECTIONAL SYNCHRONIZATION OF CONFIDENTIAL DATA USING DISTRIBUTED LEDGERS
The disclosed embodiments include computer-implemented processes that, using a distributed notarized ledger, constrain an ability of multiple parties to simultaneously, or near simultaneously, update or modify elements of reference data maintained within a centralized data store. For example, an apparatus may receive, from a first computing system, a request to modify reference data maintained at a second computing system. The apparatus may approve the first requested modification to the reference data based on a notarization criterion maintained within an element of a notarized distributed ledger, and perform operations that record notarization data characterizing the approved modification within an additional element of the notarized distributed ledger. The apparatus may also transmit the notarization data to the first computing system, and the notarization data causing an application program executed by the first computing system to modify local reference data in accordance with the notarization data.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
A computer-implemented method is disclosed. The method includes: receiving an initiation request for a data transfer associated with a terminal; determining that a resource external to the first logical storage area should be accessed to complete the data transfer; in response to determining that the resource external to the first logical storage area should be accessed to complete the data transfer, triggering a query message to an electronic device accessible to an entity associated with the first logical storage area, the query message prompting for an instruction to access the resource external to the first logical storage area to complete the transfer; receiving, from the electronic device, an instruction to access the resource external to the first logical storage area to complete the transfer; and in response to receiving the instruction, effecting the transfer using the resource external to the first logical storage area.
A computer-implemented method is disclosed. The method includes: receiving an initiation request for a data transfer associated with a terminal; determining that a resource external to the first logical storage area should be accessed to complete the data transfer; in response to determining that the resource external to the first logical storage area should be accessed to complete the data transfer, triggering a query message to an electronic device accessible to an entity associated with the first logical storage area, the query message prompting for an instruction to access the resource external to the first logical storage area to complete the transfer; receiving, from the electronic device, an instruction to access the resource external to the first logical storage area to complete the transfer; and in response to receiving the instruction, effecting the transfer using the resource external to the first logical storage area.
A computer-implemented method is disclosed. The method includes: obtaining historical operations data for a resource account, the historical operations data identifying account operations performed by a user in connection with the resource account; generating display data for a graphical user interface for accessing the resource account, the display data including user interface elements associated with a first set of highest priority account operations that are selected based on the historical operations data for the resource account; obtaining user engagement data representing user interaction with the graphical user interface, the user engagement data identifying at least one account operation; identifying a second set of highest priority account operations based on the user engagement data; generating updated display data for the graphical user interface associated with the second set of highest priority account operations; and providing, to a client device for display thereon, the updated display data.
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
33.
METHOD AND SYSTEM FOR SCHEDULING ACCESS TO A NODE CLASS OF A SHARED RESOURCE
A computer server system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor- executable instructions which, when executed by the processor, configure the processor to obtain an indication of scheduled access to a first node class of a shared resource; determine that a second node class of the shared resource is available; and schedule access to the second node class of the shared resource in place of the scheduled access to the first node class of the shared resource.
A computer-implemented method is disclosed. The method includes: sending, to a plurality of computing devices, an invitation containing a link to access a first electronic document in a first state; detecting a change in state of the first electronic document from the first state to a second state; identifying a first subset of the computing devices including devices that did not provide any indication of approval for the first electronic document and devices that have already received requests for updated approvals for the first electronic document; sending, to a second subset of the computing devices that are not included in the first subset, requests to provide indications of approval for the first electronic document in the second state; and responsive to receiving indications of approval for the first electronic document from computing devices of the second subset, generating a locked form of the first electronic document in the second state.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06F 16/176 - Support d’accès partagé aux fichiers; Support de partage de fichiers
G06F 21/64 - Protection de l’intégrité des données, p.ex. par sommes de contrôle, certificats ou signatures
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
35.
SYSTEMS AND METHODS FOR PROVIDING PRODUCT RECOMMENDATIONS
A processor-implemented method is disclosed. The method includes: receiving input representing a request to connect a data record associated with a value transfer card with a first social networking account on a social networking platform, the request including authentication information for the first social networking account; transmitting, to a computing system associated with the social networking platform, a request to obtain social media data associated with the first social networking account; receiving, from the computing system associated with the social networking platform, the requested social media data; generating a personal preference profile based on the obtained social media data; obtaining, from computing systems associated with one or more third-party affiliate entities, product data for products that are exchangeable with stored value associated with the data record; and generating recommendations of product offers based on filtering the obtained product data using the personal preference profile.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 50/00 - Systèmes ou procédés spécialement adaptés à un secteur particulier d’activité économique, p.ex. aux services d’utilité publique ou au tourisme
In an aspect, a method performed at a server includes: receiving an electronic message indicating an expected transfer, the message indicating at least a quantity of resources associated with the expected transfer and a value date associated with the expected transfer; detecting a trigger condition associated with the expected transfer; in response to detecting the trigger condition associated with the expected transfer, determining whether a transfer associated with the expected transfer has been made; and in response to determining that the expected transfer has not been made, providing a notification to a client device associated with a recipient of the expected transfer.
A computer-implemented method for providing location-based appointment operations is disclosed. The method includes receiving input indicating an instruction to perform an action related to appointments. Responsive to the input indicating the instruction to perform the action related to appointments, it may be determined that a computing device is proximate to a physical location where locations are schedulable. Then, responsive to determining that the computing device is proximate to the physical location, information related to scheduling appointments at the physical location is received via a network. The indication based on the received information is presented at the computing device. Input requesting an action in relation to an appointment at the physical location may be received at the computing device. An indication to initiate the requested action may be sent via the network. Related computing devices and computer-readable media are also disclosed.
G06Q 10/02 - Réservations, p.ex. pour billetterie, services ou manifestations
G06K 7/14 - Méthodes ou dispositions pour la lecture de supports d'enregistrement par radiation corpusculaire utilisant la lumière sans sélection des longueurs d'onde, p.ex. lecture de la lumière blanche réfléchie
H04M 1/72451 - Interfaces utilisateur spécialement adaptées aux téléphones sans fil ou mobiles avec des moyens permettant d’adapter la fonctionnalité du dispositif dans des circonstances spécifiques basés sur des horaires, p.ex. utilisant des applications de calendrier
38.
SYSTEM AND METHOD FOR REAL-TIME CHEQUE PROCESSING AND RETURN AT AN AUTOMATED TELLER MACHINE
An automated teller machine comprises a communications module; an image module; a processor; and a memory coupled to the processor storing instructions that, when executed by the processor, configure the processor to receive a first cheque for deposit; engage the image module to capture an image of the first cheque; send, via the communications module and to a server computer system, a signal that includes the image of the first cheque for acceptance; send, via the communications module and to an automated teller machine switch, a signal that includes a request for transaction authorization approval based on the first cheque; receive, via the communications module and from the server computer system, a signal that includes an indication of acceptance of the image of the first cheque; receive, via the communications module and from the automated teller machine switch, a signal that includes an indication of approval of the request for the transaction authorization based on the first cheque; and responsive to receiving the signal that includes the indication of acceptance of the image of the first cheque and the signal that includes the indication of approval of the request for the transaction authorization, return the first cheque.
36 - Services financiers, assurances et affaires immobilières
41 - Éducation, divertissements, activités sportives et culturelles
Produits et services
(1) Charitable services, namely, organizing and developing programs that aim to provide support and financial assistance to others; charitable services, namely, promoting public awareness about the need to provide support and financial assistance to others; arranging, organizing and conducting exhibitions for promoting public awareness of humanitarian issues, social community issues and initiatives; environmental initiatives, namely promoting public awareness of reducing the environmental footprint of business operations, environmental programs and green products and services of others relating to the banking, insurance and financial services industries.
(2) Charitable foundation services, namely, providing financial assistance for programs and services of others; charitable services, namely providing financial assistance to disadvantaged persons for food, rent, health care, and other necessities of life; providing project grants for environmental projects providing grants to individuals, charitable organizations, and non-profit organizations for projects in the fields of community improvement, education and environmental stewardship; providing grants and financial support to charitable organizations and governmental bodies for education, health, civic and community support, conservation of natural resources and support of philanthropy; philanthropic and charitable services, namely charitable fund raising for the purpose of supporting environmental community initiatives and raising environmental awareness; financial sponsorship of sporting games, exhibitions, contests and tournaments, e-sports games, contests, exhibitions and tournaments, musical performances and concerts, theatrical performances, comedy events, educational presentations and workshops and environmental programs and initiatives; banking, online banking and mobile banking services; investment and financial asset management services; financial planning and investment advisory services; mutual fund and mutual fund brokerage services; securities brokerage services; financial services, namely money lending and credit and loan services secured by assets; commercial lending, mortgage lending services, real estate lending services and securities lending; mortgage and online mortgage services; real estate financing; automobile financing services; insurance services.
(3) Educational services, namely, conducting training classes, seminars, conferences and workshops in the fields of finance, investment, corporate social responsibility programs, the reduction of environmental and carbon footprints, personal and professional well-being and development, education, health, civic and community support, conservation of natural resources and support of philanthropy; providing information and educational services to raise awareness of ways to help disadvantaged persons with the necessities of life providing information and educational services in the field of supporting environmental community initiatives and raising environmental awareness; entertainment services, namely, organizing and hosting exclusive receptions at sporting events and concerts.
36 - Services financiers, assurances et affaires immobilières
41 - Éducation, divertissements, activités sportives et culturelles
Produits et services
(1) Charitable services, namely, organizing and developing programs that aim to provide support and financial assistance to others; charitable services, namely, promoting public awareness about the need to provide support and financial assistance to others; arranging, organizing and conducting exhibitions for promoting public awareness of humanitarian issues, social community issues and initiatives; environmental initiatives, namely promoting public awareness of reducing the environmental footprint of business operations, environmental programs and green products and services of others relating to the banking, insurance and financial services industries.
(2) Charitable foundation services, namely, providing financial assistance for programs and services of others; charitable services, namely providing financial assistance to disadvantaged persons for food, rent, health care, and other necessities of life; providing project grants for environmental projects providing grants to individuals, charitable organizations, and non-profit organizations for projects in the fields of community improvement, education and environmental stewardship; providing grants and financial support to charitable organizations and governmental bodies for education, health, civic and community support, conservation of natural resources and support of philanthropy; philanthropic and charitable services, namely charitable fund raising for the purpose of supporting environmental community initiatives and raising environmental awareness; financial sponsorship of sporting games, exhibitions, contests and tournaments, e-sports games, contests, exhibitions and tournaments, musical performances and concerts, theatrical performances, comedy events, educational presentations and workshops and environmental programs and initiatives; banking, online banking and mobile banking services; investment and financial asset management services; financial planning and investment advisory services; mutual fund and mutual fund brokerage services; securities brokerage services; financial services, namely money lending and credit and loan services secured by assets; commercial lending, mortgage lending services, real estate lending services and securities lending; mortgage and online mortgage services; real estate financing; automobile financing services; insurance services.
(3) Educational services, namely, conducting training classes, seminars, conferences and workshops in the fields of finance, investment, corporate social responsibility programs, the reduction of environmental and carbon footprints, personal and professional well-being and development, education, health, civic and community support, conservation of natural resources and support of philanthropy; providing information and educational services to raise awareness of ways to help disadvantaged persons with the necessities of life providing information and educational services in the field of supporting environmental community initiatives and raising environmental awareness; entertainment services, namely, organizing and hosting exclusive receptions at sporting events and concerts.
36 - Services financiers, assurances et affaires immobilières
Produits et services
(1) Financial services, namely, money lending; financing of business ventures; providing funding for inventions; providing venture capital and development capital; venture capital financing services; venture capital funding services for inventors; venture capital funding services to emerging and start-up companies
A computer-implemented method is disclosed. The method includes: receiving, via a user device, input of parameters associated with a schedule item and a resource allocation; obtaining account data of a resource account associated with the user device; generating a first schedule of recommended activities for the schedule item based on the inputted parameters and the account data of the resource account, the first schedule identifying one or more activities and an order associated with the one or more activities; obtaining real-time context data associated with the user device; detecting a deviation from the first schedule based on the real-time context data; and in response to detecting the deviation, providing, via the user device, a first notification including indications of the detected deviation and a recommendation of a second schedule of activities.
A computer-implemented method is disclosed. The method includes: receiving, via a user device, input of parameters associated with a schedule item and a resource allocation; obtaining account data of a resource account associated with the user device; generating a first schedule of recommended activities for the schedule item based on the inputted parameters and the account data of the resource account, the first schedule identifying one or more activities and an order associated with the one or more activities; obtaining real-time context data associated with the user device; detecting a deviation from the first schedule based on the real-time context data; and in response to detecting the deviation, providing, via the user device, a first notification including indications of the detected deviation and a recommendation of a second schedule of activities.
G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p.ex. des interruptions ou des opérations d'entrée–sortie
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
36 - Services financiers, assurances et affaires immobilières
Produits et services
Mortgage lending services; mortgage banking services; real estate financing and refinancing services; online mortgage services, namely, providing a website where consumers can obtain information about mortgage and real estate financing and current mortgage rates, and can apply for a mortgage loan
46.
SYSTEM AND METHOD FOR EXECUTING DATA PROCESSING TASKS
Computing platforms, methods, and storage media for executing data processing tasks are disclosed. Exemplary implementations may: receive a plurality of serially executable software object tasks; obtain thread data associated with a plurality of available threads and machine data associated with a plurality of available machines; distribute the plurality of serially executable software object tasks for parallel execution via the plurality of available threads and on the plurality of available machines; and obtain and store shared thread data for the plurality of available threads, such that first thread status data associated with a first thread from the plurality of available threads is made available to a second thread from the plurality of available threads. Executing software tasks in parallel, even when the tasks were not designed to be executed in parallel, increases speed and execution of the software tasks, which uses less processing power and less memory compared to known approaches.
A system and method are provided for examining data from a source. The method is executed by a device having a processor and includes receiving a set of historical data and a set of current data to be examined, from the source. The method also includes generating multiple statistical models based on the historical data and a forecast for each model. The method also includes selecting one of the multiple statistical models based on at least one criterion, and generating a new forecast using the selected model. The method also includes comparing the set of current data against the new forecast to identify any data points in the set of current data with unexpected values. The method also includes outputting a result of the comparison, the result comprising any data points with unexpected values.
A server device, system, method, and for controlling access to project resources is disclosed. The disclosure includes a processor, and a communications module and a memory coupled to the processor. The memory, when executed by the processor, causes the processor to generate a plurality of zones for a project, each zone defining a set of access rights to: i) a database; and ii) at least one tool. The processor configures each set of access rights to allow a proxy service to access the zones, and receives, from a client device and via the proxy service, an access query to access at least one zone. The processor provides the client device access to, via the proxy service, the at least one dataset and at least one tool of the at least one zone.
H04L 47/762 - Contrôle d'admission; Allocation des ressources en utilisant l'allocation dynamique des ressources, p.ex. renégociation en cours d'appel sur requête de l'utilisateur ou sur requête du réseau en réponse à des changements dans les conditions du réseau déclenchée par le réseau
H04L 47/78 - Architectures d'allocation des ressources
H04L 47/783 - Allocation distribuée des ressources, p.ex. courtiers en bande passante
H04L 47/80 - Actions liées au type d'utilisateur ou à la nature du flux
49.
USING CONNECTED VEHICLES AS SECONDARY DATA SOURCES TO CONFIRM WEATHER DATA AND TRIGGERING EVENTS
Techniques for using connected vehicles as secondary data sources to confirm weather data and other triggering events are provided, including (1) determining indication of a weather event associated with a location of interest; (2) receiving indications of location data captured by location sensors associated with vehicles (such as vehicle-mounted sensors and/or mobile devices, virtual headsets, or wearables of passengers); (3) comparing the location data captured by the location sensors to a location of interest in order to identify one or more vehicles within a proximity of the location of interest; (4) receiving environmental sensor data captured by environmental sensors associated with one or more of the identified vehicles; and (5) determining, based upon the environmental sensor data captured by the environmental sensors associated with the one or more of the identified vehicles, an indication of an accuracy of the indication of the weather event associated with the location of interest.
50.
SYSTEM AND METHOD FOR EXECUTING DATA PROCESSING TASKS
Computing platforms, methods, and storage media for executing data processing tasks are disclosed. Exemplary implementations may: receive a plurality of serially executable software object tasks; obtain thread data associated with a plurality of available threads and machine data associated with a plurality of available machines; distribute the plurality of serially executable software object tasks for parallel execution via the plurality of available threads and on the plurality of available machines; and obtain and store shared thread data for the plurality of available threads, such that first thread status data associated with a first thread from the plurality of available threads is made available to a second thread from the plurality of available threads. Executing software tasks in parallel, even when the tasks were not designed to be executed in parallel, increases speed and execution of the software tasks, which uses less processing power and less memory compared to known approaches.
Systems and methods are described for performing analysis of parametric events. The method may include: (1) receiving weather data from a weather oracle network; (2) calculating, using a first trained machine learning algorithm, a likelihood of a trigger activation for a parametric event (or a trigger event) for a user based at least upon the weather data; (3) calculating, using a second trained machine learning algorithm, an estimated loss for the user based at least upon the likelihood of the trigger activation; (4) determining an initial coverage for the user; and (5) determining whether to offer the user updated coverage for the parametric event based at least upon a comparison of the initial coverage and the estimated loss for the user.
52.
SYSTEMS AND METHODS FOR ZERO-TRUST INDEX MUTUAL AID
Systems and methods are described for facilitating a zero-trust index mutual aid on a distributed ledger. The method may include: (1) receiving weather data at the distributed ledger; (2) detecting, based at least upon the weather data, that a trigger for a parametric event is met for a first subset of a plurality of users; (3) retrieving, responsive to the detecting, payment from a second subset of the plurality of users in accordance with a smart contract stored on the distributed ledger; (4) allocating the payment from the second subset of the plurality of users into respective allocated payments in accordance with the smart contract; and (5) causing the first subset of the plurality of users to receive the respective allocated payments in accordance with the smart contract.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
G06Q 50/00 - Systèmes ou procédés spécialement adaptés à un secteur particulier d’activité économique, p.ex. aux services d’utilité publique ou au tourisme
In some aspects, a computing system may include a processor. Also, the computing system may include a communications module coupled to the processor. Furthermore, the computing system may include a memory coupled to the processor, the memory storing instructions that, when executed, configure the computing system to: determine a daily positive modifier amount based on an amount of positive adjustments to an account over an extended time period; determine a daily non-discretionary negative modifier amount based on an amount of non-discretionary negative adjustments to the account over the extended time period; determine a daily discretionary amount based on the daily positive modifier amount and the daily non-discretionary negative modifier amount; detect an expected negative modification event; and in response to detect the expected negative modification event, trigger a notification based on the daily discretionary amount.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
54.
SYSTEMS AND METHODS FOR PERFORMING AN ACTION ON A DIGITAL ASSET
A computer system comprises a communications module; a processor coupled to the communications module; and a memory coupled to the processor, the memory storing processor- executable instructions which, when executed, configure the processor to receive, via the communications module, a signal that includes an ownership key associated with a digital asset minted on a payment card network; store the ownership key associated with the digital asset in a digital wallet; send, via the communications module and to the payment card network, a signal that includes a request to perform an action on the digital asset using the ownership key; receive, via the communications module and from the payment card network, a signal that indicates permission for the action to be performed on the digital asset; and perform the action.
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
55.
SYSTEMS AND METHODS FOR SENDING AN INDICATION THAT A DIGITAL RECEIPT IS TO BE PROVIDED FOR A PURCHASE MADE ON A PAYMENT CARD
A server computer system comprises a communications module; a processor coupled to the communications module; and a memory coupled to the processor, the memory storing processor-executable instructions which, when executed, configure the processor to store, in a database, an indication that digital receipts are to be provided for all purchases made on a payment card; receive, via the communications module and from a point-of-sale system, a signal requesting an indication that a digital receipt is to be provided for a purchase made on the payment card; consult the database to determine that the digital receipt is to be provided for the purchase made on the payment card; and send, via the communications module and to the point-of-sale system, a signal that includes the indication that the digital receipt is to be provided for the purchase made on the payment card.
A computer system comprises a communications module; a processor coupled to the communications module; and a memory coupled to the processor, the memory storing processor-executable instructions which, when executed, configure the processor to receive, via the communications module, a signal that includes an ownership key associated with a digital asset minted on a payment card network; store the ownership key associated with the digital asset in a digital wallet; send, via the communications module and to the payment card network, a signal that includes a request to perform an action on the digital asset using the ownership key; receive, via the communications module and from the payment card network, a signal that indicates permission for the action to be performed on the digital asset; and perform the action.
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
In some aspects, a computing system may include a processor. Also, the computing system may include a communications module coupled to the processor. Furthermore, the computing system may include a memory coupled to the processor, the memory storing instructions that, when executed, configure the computing system to: determine a daily positive modifier amount based on an amount of positive adjustments to an account over an extended time period; determine a daily non-discretionary negative modifier amount based on an amount of non-discretionary negative adjustments to the account over the extended time period; determine a daily discretionary amount based on the daily positive modifier amount and the daily non-discretionary negative modifier amount; detect an expected negative modification event; and in response to detect the expected negative modification event, trigger a notification based on the daily discretionary amount.
G06Q 40/02 - Opérations bancaires, p.ex. calcul d'intérêts ou tenue de compte
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A server computer system comprises a communications module; a processor coupled to the communications module; and a memory coupled to the processor, the memory storing processor-executable instructions which, when executed, configure the processor to store, in a database, an indication that digital receipts are to be provided for all purchases made on a payment card; receive, via the communications module and from a point-of-sale system, a signal requesting an indication that a digital receipt is to be provided for a purchase made on the payment card; consult the database to determine that the digital receipt is to be provided for the purchase made on the payment card; and send, via the communications module and to the point- of-sale system, a signal that includes the indication that the digital receipt is to be provided for the purchase made on the payment card.
Apparatus and methods for expanding a data transfer framework are disclosed. Exemplary implementations may: provide an ETL framework comprising a plurality of ETL modules and comprising code including variables; obtain a configuration file including data values to replace the variables for executing selected ETL modules, and including external command data configured to execute a new data transformation external to and absent from the ETL framework, the external command data including a reference to an external module generated in relation to an external interface; and execute the one or more selected ETL modules based on the code, the data values and the external command data. Exemplary implementations provide a flexible and expandable ETL framework that enable a new type of data transformation that is not currently supported by the framework, without having to modify the framework. The framework may impart native properties and characteristics of the framework to the external module.
Apparatus and methods for expanding a data transfer framework are disclosed. Exemplary implementations may: provide an ETL framework comprising a plurality of ETL modules and comprising code including variables; obtain a configuration file including data values to replace the variables for executing selected ETL modules, and including external command data configured to execute a new data transformation external to and absent from the ETL framework, the external command data including a reference to an external module generated in relation to an external interface; and execute the one or more selected ETL modules based on the code, the data values and the external command data. Exemplary implementations provide a flexible and expandable ETL framework that enable a new type of data transformation that is not currently supported by the framework, without having to modify the framework. The framework may impart native properties and characteristics of the framework to the external module.
G06F 16/25 - Systèmes d’intégration ou d’interfaçage impliquant les systèmes de gestion de bases de données
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
61.
SYSTEM AND METHOD FOR AUTOMATICALLY MANAGING STORAGE RESOURCES OF A BIG DATA PLATFORM
There is provided a computer-implemented method for automatically managing storage resources of a distributed file system comprising: obtaining actual past storage usage data of a first directory from a plurality of directories of the distributed file system to a current time; detecting, a space quota limit for the first directory and associated with a pre-defined expected future time; determining from the actual past storage usage data, projected storage usage data of the first directory over a future time period; obtaining an aggregated correction coefficient providing an indication of aggregated projected storage usage needs of remaining other directories relative to the first directory; in response to determining an expected value of the projected storage usage data at the expected future time is inconsistent with the space quota limit, adjusting the space quota limit to a new quota limit based on the expected value weighted by the aggregated correction coefficient.
A computer-implemented method is disclosed. The method includes: receiving, via a client device, a resource transfer request for resources to be transferred to a transferee account; generating a secure data object based on request data of the resource transfer request, the secure data object including a first hash computed based on an input string comprising a transferee account identifier; signing the secure data object using a private key of a transferee resource account management system; and sending the signed secure data object to a messaging address associated with a transferor account.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
63.
System And Method for Managing Data Stored in A Remote Computing Environment
A system, method and memory for managing remotely stored data is disclosed. The system includes a processor, a communications module, and a memory. Instructions stored on the memory cause the processor to provide an agent within a remote computing environment (RCE) with access to data stored on the RCE and custom applications. Another agent on a local computing environment capable of communicating with the agent is provided. The other agent has access to configuration files. The other agent instructs the agent to execute custom applications based on the configuration files. The other agent receives metadata of the data in response to triggering the agent. The instructions cause the processor to populate, via the other agent, a catalogue of the plurality of data within the remote computing environment based on the received plurality of metadata, and provide the catalogue for display for reviewing the plurality of data.
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p.ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
64.
System and Method for Managing Data Stored in A Remote Computing Environment
A method, device and memory for providing access to remotely stored data is provided. The method includes providing an interface capable of communicating with a remote computing environment storing a plurality of data sets. The method includes receiving a request, via the interface, to access at data sets according to access parameters. The method includes applying a first set of masking parameters when the data sets are accessed via respective views. The method includes satisfying the request by granting access to the views associated with the data sets, without copying the data sets. The views enable data from the data sets to be viewed as masked according to the first set of masking parameters, and the views are masked according to a second set of masking parameters associated with the access parameters.
In an aspect a computer system is configured to: receive accelerated transfer definition data defining one or more conditions for accelerating a transfer; obtain a due date for completing the transfer; initiate the transfer in response to the earlier of: determining that at least one of the conditions for accelerating the transfer have occurred; and determining that a current date is within a defined proximity of the due date for completing the transfer.
A system for testing applications is disclosed. The system includes one or more processors, one or more communications modules coupled to the one or more processors to enable communications between services provided by the system, and at least one memory coupled to the one or more processors. The at least one memory stores computer executable instructions to enable a plurality of virtualized test services, each virtualized test service at least in part emulating dependent server responses to application operations. The instructions enable a load-balancing service for communication with the plurality of virtualized test services, and test an application based on a load, by directing the application to interact with the plurality of virtualized test services that are available, while avoiding communicating with the dependent servers during testing. The load-balancing service balances the testing of the application between the plurality of virtualized test services that are available.
A computer-implemented method is disclosed. The method includes: receiving a second request to create a first service object instance of a first service object; identifying a first set of service object instances that are related to the first service object instance based on at least a time associated with the first service object instance and a first service location; obtaining location data associated with a first set of service object instances; determining a geographical area associated with a second request based on the location data associated with the first set of service object instances and a first service location; and causing to be displayed, in a map interface, an interactive map UI element showing a map region corresponding to the geographical area, the map UI element including graphical representations of the first service object instance, the first set of service object instances, and a current location associated with the merchant.
36 - Services financiers, assurances et affaires immobilières
Produits et services
(1) Financial services, namely, money lending; financing of business ventures; providing funding for inventions; providing venture capital and development capital; venture capital financing services; venture capital funding services for inventors; venture capital funding services to emerging and start-up companies
69.
SYSTEM AND METHOD FOR MANAGING DATA STORED IN A REMOTE COMPUTING ENVIRONMENT
A method, device and memory for providing access to remotely stored data is provided. The method includes providing an interface capable of communicating with a remote computing environment storing a plurality of data sets. The method includes receiving a request, via the interface, to access at data sets according to access parameters. The method includes applying a first set of masking parameters when the data sets are accessed via respective views. The method includes satisfying the request by granting access to the views associated with the data sets, without copying the data sets. The views enable data from the data sets to be viewed as masked according to the first set of masking parameters, and the views are masked according to a second set of masking parameters associated with the access parameters.
G06F 16/90 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet - Détails des fonctions des bases de données indépendantes des types de données cherchés
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
70.
SYSTEMS AND METHODS FOR MANAGING ONLINE STOREFRONTS
A computer-implemented method is disclosed. The method includes: receiving a second request to create a first service object instance of a first service object; identifying a first set of service object instances that are related to the first service object instance based on at least a time associated with the first service object instance and a first service location; obtaining location data associated with a first set of service object instances; determining a geographical area associated with a second request based on the location data associated with the first set of service object instances and a first service location; and causing to be displayed, in a map interface, an interactive map UI element showing a map region corresponding to the geographical area, the map UI element including graphical representations of the first service object instance, the first set of service object instances, and a current location associated with the merchant.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
71.
SYSTEM AND METHOD FOR MANAGING DATA STORED IN A REMOTE COMPUTING ENVIRONMENT
A system, method and memory for managing remotely stored data is disclosed. The system includes a processor, a communications module, and a memory. Instructions stored on the memory cause the processor to provide an agent within a remote computing environment (RCE) with access to data stored on the RCE and custom applications. Another agent on a local computing environment capable of communicating with the agent is provided. The other agent has access to configuration files. The other agent instructs the agent to execute custom applications based on the configuration files. The other agent receives metadata of the data in response to triggering the agent. The instructions cause the processor to populate, via the other agent, a catalogue of the plurality of data within the remote computing environment based on the received plurality of metadata, and provide the catalogue for display for reviewing the plurality of data.
H04L 67/025 - Protocoles basés sur la technologie du Web, p.ex. protocole de transfert hypertexte [HTTP] pour la commande à distance ou la surveillance à distance des applications
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p.ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
In an aspect a computer system is configured to: receive accelerated transfer definition data defining one or more conditions for accelerating a transfer; obtain a due date for completing the transfer; initiate the transfer in response to the earlier of: determining that at least one of the conditions for accelerating the transfer have occurred; and determining that a current date is within a defined proximity of the due date for completing the transfer.
A system for testing applications is disclosed. The system includes one or more processors, one or more communications modules coupled to the one or more processors to enable communications between services provided by the system, and at least one memory coupled to the one or more processors. The at least one memory stores computer executable instructions to enable a plurality of virtualized test services, each virtualized test service at least in part emulating dependent server responses to application operations. The instructions enable a load-balancing service for communication with the plurality of virtualized test services, and test an application based on a load, by directing the application to interact with the plurality of virtualized test services that are available, while avoiding communicating with the dependent servers during testing. The load-balancing service balances the testing of the application between the plurality of virtualized test services that are available.
G06F 11/36 - Prévention d'erreurs en effectuant des tests ou par débogage de logiciel
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
74.
System, Method, And Device for Uploading Data from Premises to Remote Computing Environments
A device, method and system for loading data into a remote computing environment is disclosed. The method includes receiving a request to load a new data set into a remote computing environment, the new data set impacting a data set stored thereon. The method includes identifying one or more changes to a current representation of the data set within the new data set, the one or more changes replacing information in the current representation. The method includes transmitting the identified one or more changes to a data store persisting the current representation. The method includes transmitting the replaced information to a data store persisting a previous representation of the data set. The method includes transmitting other information in the new data set that is determined to be invalid data to a data store persisting an invalid data set associated with the data set.
Computing platforms, methods, and storage media for data movement are disclosed. Exemplary implementations may: obtain a data transfer command including a table-based characterization of a set of data to be transferred; automatically determine, based on the table-based characterization of the data to be transferred, a set of files to be transferred; and initiate transfer of the set of files. In an implementation, data is moved at the table level, and the files associated with the specified tables/date range are automatically determined. A single command, which may reference a CSV file, may be used to efficiently and reliably transfer a large amount of data without a user having to specify the specific files to be transferred.
H04L 67/1095 - Réplication ou mise en miroir des données, p.ex. l’ordonnancement ou le transport pour la synchronisation des données entre les nœuds du réseau
76.
System, Method, And Device for Ingesting Data into Remote Computing Environments
A system, device, and method for ingesting data into a remote computing environment are provided. The example device comprises a processor, a communications module, and a memory. The processor executes instructions on the memory to receive a data file, and extract metadata from the data file. The extracted metadata comprises at least one property of the data file. A configuration file, from a plurality of configuration files, that is associated with the data file is determined. The determination is performed, at least in part, based on correlating the extracted metadata with data file types used by the determined configuration file. The data file is ingested for storage in a remote computing environment based on the determined configuration file.
A computer server system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to obtain, from at least one big data source, a big data dataset that includes transaction data; categorize the transaction data into a number of data buckets; analyze the transaction data from at least one of the data buckets to generate at least one graphical user interface to display at least some of the transaction data from the at least one of the data buckets, the at least one graphical user interface including at least one selectable interface element to adjust a display of the graphical user interface; and send, via the communications module and to a computing device, the at least one graphical user interface for display.
G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
G06F 3/04845 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs pour la transformation d’images, p.ex. glissement, rotation, agrandissement ou changement de couleur
78.
System, method, and device for uploading data from premises to remote computing environments
A system, method and device for ingesting data files into remote computing environments is disclosed. The method includes receiving a plurality of data files and processing same according to a modified round-robin (MRR) process. The MRR assigns data files for processing by determining which of a plurality of remote processors are active, and by determining an amount of queued processing for the active remote processors. The method includes assigning each data file of the plurality of data files to a remote processor of the plurality of remote processors based on the remote processor (1) being active, and (2) having a relatively lower amount of queued processing. The method includes instructing a storage writer to store processed data files.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer software and downloadable mobile applications for electronically trading securities and managing financial portfolios; downloadable electronic publications in the nature of magazines, newsletters, and brochures in the fields of finance, investment, and securities trading Financial advisory and financial management services; investment advisory and investment management services; investment and financial asset management services; securities brokerage services; electronic fund transfer services
Computing platforms, methods, and storage media for data movement are disclosed. Exemplary implementations may: obtain a data transfer command including a table-based characterization of a set of data to be transferred from an on-premise platform to a cloud platform, the data transfer command further including a date specification; automatically determine, based on the table-based characterization of the data to be transferred and based on the date specification, a set of files to be transferred; and initiate transfer of the set of files from the on-premise platform to the cloud platform. In an implementation, data is moved at the table level, and the files associated with the specified tables/date range are automatically determined. A single command, which may reference a CSV file, may be used to efficiently and reliably transfer a large amount of data without a user having to specify the specific files to be transferred.
A system, device, and method for ingesting data into a remote computing environment are provided. The example device comprises a processor, a communications module, and a memory. The processor executes instructions on the memory to receive a data file, and extract metadata from the data file. The extracted metadata comprises at least one property of the data file. A configuration file, from a plurality of configuration files, that is associated with the data file is determined. The determination is performed, at least in part, based on correlating the extracted metadata with data file types used by the determined configuration file. The data file is ingested for storage in a remote computing environment based on the determined configuration file.
G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
G06F 16/908 - Recherche caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
82.
SYSTEM AND METHOD FOR GENERATING A GRAPHICAL USER INTERFACE TO TRACK, ANALYZE AND INTERPRET A BIG DATA DATASET
A computer server system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor- executable instructions which, when executed by the processor, configure the processor to obtain, from at least one big data source, a big data dataset that includes transaction data; categorize the transaction data into a number of data buckets; analyze the transaction data from at least one of the data buckets to generate at least one graphical user interface to display at least some of the transaction data from the at least one of the data buckets, the at least one graphical user interface including at least one selectable interface element to adjust a display of the graphical user interface; and send, via the communications module and to a computing device, the at least one graphical user interface for display.
G06F 16/904 - Navigation; Visualisation à cet effet
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
A device, method and system for loading data into a remote computing environment is disclosed. The method includes receiving a request to load a new data set into a remote computing environment, the new data set impacting a data set stored thereon. The method includes identifying one or more changes to a current representation of the data set within the new data set, the one or more changes replacing information in the current representation. The method includes transmitting the identified one or more changes to a data store persisting the current representation. The method includes transmitting the replaced information to a data store persisting a previous representation of the data set. The method includes transmitting other information in the new data set that is determined to be invalid data to a data store persisting an invalid data set associated with the data set.
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p.ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
H04L 67/5682 - Politiques ou règles de mise à jour, de suppression ou de remplacement des données stockées
84.
SYSTEM, METHOD, AND DEVICE FOR UPLOADING DATA FROM PREMISES TO REMOTE COMPUTING ENVIRONMENTS
A system, method and device for ingesting data files into remote computing environments is disclosed. The method includes receiving a plurality of data files and processing same according to a modified round-robin (MRR) process. The MRR assigns data files for processing by determining which of a plurality of remote processors are active, and by determining an amount of queued processing for the active remote processors. The method includes assigning each data file of the plurality of data files to a remote processor of the plurality of remote processors based on the remote processor (1) being active, and (2) having a relatively lower amount of queued processing. The method includes instructing a storage writer to store processed data files.
H04L 67/06 - Protocoles spécialement adaptés au transfert de fichiers, p.ex. protocole de transfert de fichier [FTP]
H04L 67/1017 - Sélection du serveur pour la répartition de charge basée sur un mécanisme à tour de rôle
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p.ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
85.
SYSTEM AND METHOD FOR AUTOMATICALLY PROVIDING A SECOND RESOURCE TYPE TO REPLACE OR OFFSET A FIRST RESOURCE TYPE
A computer server system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor- executable instructions which, when executed by the processor, configure the processor to monitor resource consumption data to identify a first resource type being provided to a resource requester at a periodic rate; identify a second resource type to replace or offset the first resource type at the periodic rate; and perform operations to automatically provide the second resource type to replace or offset the first resource type at the periodic rate.
A non-autoregressive transformer model is improved to maintain output quality while reducing a number of iterative applications of the model by training parameters of a student model based on a teacher model. The teacher model is applied several iterations to a masked output and a student model is applied one iteration, such that the respective output token predictions for the masked positions can be compared and a loss propagated to the student. The loss may be based on token distributions rather than the specific output tokens alone, and may additionally consider hidden state losses. The teacher model may also be updated for use in further training based on the updated model, for example, by updating its parameters as a moving average.
A computer server system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to monitor resource consumption data to identify a first resource type being provided to a resource requester at a periodic rate; identify a second resource type to replace or offset the first resource type at the periodic rate; and perform operations to automatically provide the second resource type to replace or offset the first resource type at the periodic rate.
A non-autoregressive transformer model is improved to maintain output quality while reducing a number of iterative applications of the model by training parameters of a student model based on a teacher model. The teacher model is applied several iterations to a masked output and a student model is applied one iteration, such that the respective output token predictions for the masked positions can be compared and a loss propagated to the student. The loss may be based on token distributions rather than the specific output tokens alone, and may additionally consider hidden state losses. The teacher model may also be updated for use in further training based on the updated model, for example, by updating its parameters as a moving average.
A computer-implemented method is disclosed. The method includes: authenticating a user for login to a service for a first authenticated user session; in response to authenticating the user, sending, to a client device associated with the user, a first data string associated with a first validity period; receiving, from the client device after expiry of the first authenticated user session, a data access request to access protected data, the data access request including the first data string; validating the first data string based on checking the first validity period; and in response to determining that the first data string is valid, transmitting, to the client device, a data access response including at least a subset of the requested protected data.
Methods and systems for charging an electric vehicle (EV) are described herein. An EV may require additional battery power to reach a charging station. A remote server in communication with the EV or an on-board computer or mobile device in the EV may obtain data to determine a location for the EV to meet a charging vehicle. The charging vehicle may be dispatched to meet the EV and deliver power to it, enabling the EV to reach a charging station or other destination. In some examples, the charging vehicle may deliver power to the EV while both vehicles are stationary. In other examples, the charging vehicle may couple to the EV while both vehicles are in motion.
G05D 1/697 - pour la rencontre de plusieurs véhicules, p. ex. pour le ravitaillement en vol (amarrage à une station de base G05D 1/661)
B60L 53/57 - Stations de charge sans raccordement aux réseaux électriques
B60L 53/68 - Surveillance ou commande hors site, p.ex. télécommande
B60W 60/00 - Systèmes d’aide à la conduite spécialement adaptés aux véhicules routiers autonomes
H02J 7/00 - Circuits pour la charge ou la dépolarisation des batteries ou pour alimenter des charges par des batteries
G05D 1/648 - Exécution d’une tâche au sein d’une zone ou d’un espace de travail, p. ex. nettoyage
G05D 1/667 - Livraison ou récupération de charges utiles
G05D 1/686 - Maintien d’une position relative par rapport à des cibles en mouvement, p. ex. pour suivre des animaux ou des êtres humains (pour diriger des charges utiles vers des cibles G05D 1/689; impliquant la commande de la position ou du cap de plusieurs véhicules G05D 1/69)
91.
RECHARGE SYSTEM FOR ELECTRIC VEHICLE (EV) WITHOUT IMMEDIATE ACCESS TO PERMANENT CHARGING STATION
Methods and systems for charging an electric vehicle (EV) are described herein. An EV may require additional battery power to reach a charging station. A remote server in communication with the EV or an on-board computer or mobile device in the EV may obtain data to determine a location for the EV to meet a charging vehicle. The charging vehicle may be dispatched to meet the EV and deliver power to it, enabling the EV to reach a charging station or other destination. In some examples, the charging vehicle may deliver power to the EV while both vehicles are stationary. In other examples, the charging vehicle may couple to the EV while both vehicles are in motion.
A server computer system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to receive, via the communications module and from a remote computing device, a signal including a request to provision a data record for a service; select digital identity network verification as a primary verification technique; attempt verification using the primary verification technique; determine that verification using the primary verification technique has failed; responsive to determining that verification using the primary verification technique has failed, attempt verification using a secondary verification technique; determine successful verification using the secondary verification technique; and responsive to successful verification using the secondary verification technique, provision the data record for the service.
Systems and methods of determining whether to initiate a pull of an accumulated data transfer amount are described. An accumulated data transfer amount for a periodic data transfer scheduled to be pushed at a future date is determined. A determination is made of whether an overall data amount in a storage location is expected to be greater at a date on or after the scheduled future date if a pull of the accumulated data transfer amount is performed before the scheduled future date than if a pull operation is not performed and the accumulated data transfer amount is sent at the scheduled future date. When the overall data amount in the storage location is expected to be greater at the scheduled future date if the pull of the accumulated data transfer amount is performed, a pull of the accumulated data transfer amount is initiated.
The following relates generally to providing virtual reality (VR) alerts to a driver of an autonomous vehicle. For example, a vehicle may be driving autonomously while the driver is watching a VR movie (e.g., on a pair of VR goggles); the driver may then receive a VR alert recommending that the driver take control of the vehicle (e.g., switch the vehicle from autonomous to manual mode). The following also relates to generating a VR feed for presenting real-time road conditions so that a user may preview a road segment. The following also relates to generating a VR feed corresponding to an event (e.g., a vehicle collision, a crime, a weather event, and/or a natural disaster).
B60W 60/00 - Systèmes d’aide à la conduite spécialement adaptés aux véhicules routiers autonomes
B60W 20/50 - Stratégies de commande pour répondre aux défaillances du système, p.ex. pour le diagnostic de pannes, le fonctionnement de secours ou en mode de fonctionnement dégradé
B60W 30/00 - Fonctions des systèmes d'aide à la conduite des véhicules routiers non liées à la commande d'un sous-ensemble particulier, p.ex. de systèmes comportant la commande conjuguée de plusieurs sous-ensembles du véhicule
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
The following relates generally to providing virtual reality (VR) alerts to a driver of an autonomous vehicle. For example, a vehicle may be driving autonomously while the driver is watching a VR movie (e.g., on a pair of VR goggles); the driver may then receive a VR alert recommending that the driver take control of the vehicle (e.g., switch the vehicle from autonomous to manual mode). The following also relates to generating a VR feed for presenting real-time road conditions so that a user may preview a road segment. The following also relates to generating a VR feed corresponding to an event (e.g., a vehicle collision, a crime, a weather event, and/or a natural disaster).
96.
NAVIGATION SYSTEM FOR PROVIDING RECOMMENDED ROUTES BASED ON DRIVER SKILL LEVEL
The present systems and method relate generally to adjusting navigation directions. In some embodiments, one or more processors obtain a driving score based upon a user's driving history traversing streets displayed in virtual reality (VR). A request for navigation directions may then be received, and a set of navigation directions may be generated in response to the request. The generated set of navigation directions may be adjusted based upon the driving score.
97.
BLOCKCHAIN-BASED SECURITY TOKEN FOR KYC VERIFICATION
An example operation may include one or more of storing transaction content from transactions executed via one or more fiat payment accounts and one or more crypto accounts of a digital wallet of a user, identifying historical usage characteristics of the one or more fiat payment accounts and the one or more crypto accounts from the stored transaction content, creating a security token for the user and embedding the historical usage characteristics within a storage area of the security token, executing a blockchain consensus process among a plurality of blockchain peers of a blockchain network to verify the security token, and committing the security token to a blockchain ledger of the blockchain network in response to verification of the security token.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
98.
API FOR INCREMENTAL AND PERIODIC CRYPTO ASSET TRANSFER
An example operation may include one or more of storing transaction content from transactions executed via one or more fiat payment accounts and one or more crypto accounts of a digital wallet of a user, and determining, via execution of a machine learning model on the stored transaction content, a recurring expense value of the user and a next point in time in which the recurring expense value, dividing the recurring expense value into a plurality of sub-values; generating a plurality of transactions which transfer the plurality of sub-values from a fiat payment account to a crypto account from among the one or more crypto accounts and store the plurality of transactions within a queue, initiating a plurality of time-to-live jobs for the plurality of transactions, respectively, wherein the plurality of time-to-live jobs comprise a plurality of different respective expiration times that are staggered such that the plurality of time-to live jobs expire in incremental intervals from a current time to the next point in time in which the recurring expense value is due and executing the plurality of transactions at the plurality of different expiration times to incrementally transfer the plurality of sub-values from the fiat account to a crypt account via an application programming interface (API).
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
The disclosed exemplary embodiments include computer-implemented systems, devices, and processes that securely distribute digital assets within a computing environment using permissioned distributed ledgers. For example, an apparatus may receive, from a computing system, an allocation request, a first digital signature applied to the allocation request, and a second digital signature applied to the allocation request and to the first digital signature. Based on a validation of the first and second digital signatures, the apparatus may approve the allocation request and allocate a digital asset to the first device in accordance with the approved allocation request. The apparatus may also perform operations that record a public key and asset data identifying a digital asset onto a distributed ledger, and may generate and transmit, to the first device, confirmation data indicative of the allocation of the digital asset to the first device.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 30/0226 - Systèmes d’incitation à un usage fréquent, p.ex. programmes de miles pour voyageurs fréquents ou systèmes de points
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
100.
APPLICATION OF TRAINED ARTIFICIAL INTELLIGENCE PROCESSES TO ENCRYPTED DATA WITHIN A DISTRIBUTED COMPUTING ENVIRONMENT
The disclosed embodiments include computer-implemented processes that predict a credit score for a customer in real-time based on an application of a trained machine-learning or artificial-intelligence process to encrypted event data at a third-party computing cluster. For example, an apparatus may transmit encrypted event data to a third-party computing system. The third-party computing system may apply a trained artificial intelligence process to encrypted feature data that includes the encrypted event data, and the apparatus may receive, from the third-party computing system, encrypted output data representative of a predicted credit score during at least one temporal interval. The apparatus may decrypt the encrypted output data using a homomorphic decryption key, and transmit a notification that includes the decrypted output data to a device. An application program executed at the device may present a graphical representation of at least a portion of the decrypted output data within a digital interface.